Login / Signup
Another Look at Security Theorems for 1-Key Nested MACs.
Neal Koblitz
Alfred Menezes
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
high security
intrusion detection
security problems
access control
security issues
security requirements
private key
digital topology
data mining
security threats
security analysis
key management
security mechanisms
information security
hierarchical structure
case study
information systems