Login / Signup
The Application of One-Way Hash Functions in Information Security Protocols.
Jonathan Z. Sun
Published in:
Security and Management (2010)
Keyphrases
</>
hash functions
security protocols
information systems
computer systems
similarity search