Login / Signup
Provable security for 13 round Skipjack-like structure.
Seokhie Hong
Jaechul Sung
Sangjin Lee
Jongin Lim
Jongsu Kim
Published in:
Inf. Process. Lett. (2002)
Keyphrases
</>
network security
database
databases
access control
data mining
learning algorithm
intrusion detection
tree structure
information security
security policies
security management