Back to Results
First PageMeta Content



MACs and Authenticated Encryption February 7, 2013 Introduction Information Security consists of: – Confidentiality (achieved through encryption, aims to prevent adversary from reading a
Add to Reading List

Document Date: 2013-08-05 10:54:57


Open Document

File Size: 83,10 KB

Share Result on Facebook