Login / Signup

Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC.

Soichi FuruyaKouichi Sakurai
Published in: ICICS (2002)
Keyphrases
  • high security
  • database systems
  • neural network
  • multiscale
  • sensor networks
  • information security