Login / Signup
Secure Sessions from Weak Secrets.
Bruce Christianson
Michael Roe
David Wheeler
Published in:
Security Protocols Workshop (2003)
Keyphrases
</>
security issues
neural network
stream cipher
security management
search engine optimization
security requirements
sensitive information
database
lightweight
case study
information systems
sensitive data
key management
security protocols
information retrieval
covert channel
scalar product