18

From HORSE - Holistic Operational Readiness Security Evaluation.
Revision as of 12:36, 16 October 2014 by Mdpeters (talk | contribs) (Reverted edits by KarenSanders (talk) to last revision by Mdpeters)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Footnote 18

For a more thorough examination of properties desirable in a digital signature, see generally Bruce Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C §2.6, 33-40 (2d ed. 1996) (hereinafter "Schneier"); Mitchell, Piper & Wild, Digital Signatures, in Contemporary Cryptology: The Science of Information Integrity 325, 341-46 (Gustavas Simmons ed., 1991).