Computation of discrete logarithms in prime fields
Designs, Codes and Cryptography
Review: TCP/IP security threats and attack methods
Computer Communications
Hi-index | 0.00 |
Systems such as Kerberos, designed to provide secure user and service authentication over insecure open networks, continue to gain acceptance in the UNIX world. There are both freely available and commercial products which reduce the vulnerabilities ...