Login / Signup
Security of permutation-based compression function Ip231.
Jooyoung Lee
Daesung Kwon
Published in:
Inf. Process. Lett. (2014)
Keyphrases
</>
security issues
information security
data compression
security threats
compression algorithm
computer security
access control
intrusion detection
network security
information assurance
virtual private network
information systems
security policies
security requirements
network layer