The Glowworm hash: Increased speed and security for BBC unkeyed jam resistance.
Leemon C. Baird IIIMartin C. CarlisleWilliam L. BahnEric SmithPublished in: MILCOM (2012)
Keyphrases
- security properties
- security analysis
- security requirements
- security model
- security vulnerabilities
- information security
- real time
- user authentication
- security policies
- neural network
- security mechanisms
- security problems
- security protocols
- key management
- database
- intrusion detection
- access control
- data structure
- swarm optimization