Cited By
View all- Park J(2010)Privacy-enhanced Key Recovery in mobile communication environmentsThe Journal of Supercomputing10.1007/s11227-009-0287-454:1(82-93)Online publication date: 1-Oct-2010
- Rantos KMitchell C(2005)Matching key recovery mechanisms to business requirementsComputers and Security10.1016/j.cose.2004.08.01024:3(232-245)Online publication date: 1-May-2005
- Viswanathan KBoyd CDawson E(2001)Hybrid Key EscrowComputers and Security10.1016/S0167-4048(02)00111-621:1(77-92)Online publication date: 1-Jan-2001
- Show More Cited By