Check out the new USENIX Web site. next up previous
Next: Other benefits of using Up: Introduction Previous: The SEM architecture.

Decryption and signing in the SEM architecture

We now describe in more detail how decryption and signing is done in the SEM architecture:

Note that all interaction with the SEM involves very short messages.


next up previous
Next: Other benefits of using Up: Introduction Previous: The SEM architecture.
Gene Tsudik
2001-05-10