K2 stream cipher
Year of publication: |
2008
|
---|---|
Authors: | Kiyomoto, Shinsaku ; Tanaka, Toshiaki ; Sakurai, Kouichi |
Published in: |
E-business and telecommunications : 4th international conference ; revised selected papers. - Berlin : Springer, ISBN 978-3-540-88652-5. - 2008, p. 214-226
|
Subject: | IT-Kriminalität | IT crime | Zutrittskontrolle | User access control | Datensicherheit | Data security | Algorithmus | Algorithm | Theorie | Theory |
-
Saravanan, P., (2016)
-
E-business and telecommunications : 4th international conference ; revised selected papers
Filipe, Joaquim, (2008)
-
Timing to block scanning malwares by using combinatorics proliferation model
Omote, Kazumasa, (2008)
- More ...
-
Proposal for a privacy policy manager as architecture for a new privacy-enhancing platform
Takasaki, Haruo, (2017)
-
Proposal for a privacy policy manager as architecture for a new privacy-enhancing platform
Takasaki, Haruo, (2017)
-
Offline peer-to-peer broadcast with anonymity
Kiyomoto, Shinsaku, (2011)
- More ...