Login / Signup

Algebraic manipulation detection codes and their applications for design of secure cryptographic devices.

Zhen WangMark G. Karpovsky
Published in: IOLTS (2011)
Keyphrases
  • automatic detection
  • false alarms
  • key management
  • mobile devices
  • sensor networks
  • low cost
  • anomaly detection
  • detection method
  • hash functions
  • cryptographic protocols