Sciweavers

ACISP   1998 Australasian Conference on Information Security and Privacy
Wall of Fame | Most Viewed ACISP-1998 Paper
ACISP
1998
Springer
13 years 8 months ago
Detecting Key-Dependencies
The confidentiality of encrypted data depends on how well the key under which it was encrypted is maintained. If a session key was exchanged encrypted under a long-term key, exposu...
Tage Stabell-Kulø, Arne Helme, Gianluca Din...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source153
2Download preprint from source127
3Download preprint from source124
4Download preprint from source111
5Download preprint from source85