Login / Signup
Algebraic manipulation detection codes and their applications for design of secure cryptographic devices.
Zhen Wang
Mark G. Karpovsky
Published in:
IOLTS (2011)
Keyphrases
</>
automatic detection
false alarms
key management
mobile devices
sensor networks
low cost
anomaly detection
detection method
hash functions
cryptographic protocols