Login / Signup
Security of Hash-then-CBC Key Wrapping Revisited.
Yasushi Osaki
Tetsu Iwata
Published in:
IMACC (2011)
Keyphrases
</>
high security
information security
security analysis
statistical databases
private key
intrusion detection
security policies
neural network
similarity measure
operating system
key management
security protocols
data security