Login / Signup
Security of Sequential Multiple Encryption.
Atsushi Fujioka
Yoshiaki Okamoto
Taiichi Saito
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2012)
Keyphrases
</>
encryption algorithms
encryption decryption
security analysis
security properties
identity authentication
digital rights management
encryption scheme
key management
high security
information security
data security
key exchange
data confidentiality
virtual private network