Login / Signup
On the Security of Reduced Versions of 3-Pass HAVAL.
Sangwoo Park
Soo Hak Sung
Seongtaek Chee
Jongin Lim
Published in:
ACISP (2002)
Keyphrases
</>
information security
security issues
security policies
computer security
intrusion detection
information assurance
database security
security level
security threats
network security
statistical databases
network management
security mechanisms
key management
data security
security model