×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [authentication tag]
453 Network Security Section 3a: Message Authentication and Public-Key Cryptography Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology -
218 views
Made Harta Dwijaksara Park, Yi Jae
25 views
Hash Function
116 views
1 Hash Function. Hash Functions Dedicated Hash Functions ◦ Useful for lightweight authentication in RFID system Message Authentication Codes ◦ CBC-MAC
270 views
Computer Security: Principles and Practice
29 views
CHAPTER 8: SECURITY IN COMPUTER NETWORKS
35 views
< Prev