|
31 |
Software-Escrow Enthalten in Informatik-Spektrum Bd. 28, 23.9.2005, Nr. 5, date:10.2005: 403-406
|
|
|
32 |
Strongly secure identity-based authenticated key agreement protocols in the escrow mode Enthalten in Science China / Information sciences Bd. 56, 11.4.2012, Nr. 8, date:8.2013: 1-14
|
|
|
33 |
Translucent Cryptography—An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer Enthalten in Journal of cryptology Bd. 12, 17.6.1999, Nr. 2, date:3.1999: 117-139
|
|
|
34 |
Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow Enthalten in Mobile networks and applications Bd. 28, 11.3.2023, Nr. 5, date:10.2023: 1625-1635
|
|
|
35 |
Escrow agreement Sicherungsgeschäft
|
|
|
36 |
Hinterlegung
|
|
|
37 |
Peters, Stephan Informatiker
|
|