Search
Now showing items 1-1 of 1
Binding bit patterns to real world entities
(University of Hertfordshire, 1997)
Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principles who are authorized to ...