Login / Signup
Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC.
Soichi Furuya
Kouichi Sakurai
Published in:
ICICS (2002)
Keyphrases
</>
high security
database systems
neural network
multiscale
sensor networks
information security