Screening the covert key using honey encryption to rule out...

Screening the covert key using honey encryption to rule out the brute force attack of AES-a survey

Dharshini, P, Arokia Renjith, J, Mohan Kumar, P
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Volume:
9
Language:
english
Journal:
Security and Communication Networks
DOI:
10.1002/sec.1753
Date:
December, 2016
File:
PDF, 253 KB
english, 2016
Conversion to is in progress
Conversion to is failed