
18 Sep
2003
18 Sep
'03
12:09 a.m.
On Wed, 17 Sep 2003, David Schwartz wrote:
In fact, you could just use an RSA public key as the identifier directly. This is likely not the best algorithm, but it's certainly an existence proof that such algorithms can be devised without difficulty.
In fact, I'm going to call my patent attorney instead of sending this email. ;)
Too late. The details can be found in my final report for the US Army SBIR program for developing "Security for Open Architecture Web-Centric Systems". :) --vadim