Principles and Applications of Cryptographic Key Management [chapter]

William Hugh Murray
2007 Information Security Management Handbook, Sixth Edition  
doi:10.1201/9781439833032.ch90 fatcat:utw4uheq6ncetcxkb4iznz7npm