Login / Signup

Update on Cryptography: Who Will Keep the Keys?

Donn B. Parker
Published in: Inf. Secur. J. A Glob. Perspect. (1994)
Keyphrases
  • cellular automata
  • data model
  • information security
  • hash functions
  • machine learning
  • search algorithm
  • update operations