Encrypted Key Recovery via Social Trust Models
Table of Links
Abstract and 1. Introduction
Related Work
2.1 The Alternative-Authenticator Approach
2.2 The Original-Authenticator Approach
The Proposed Secret Backup Approaches
3.1 Notations
3.2 Ass...