Information Assurance/Encryption

  • Easttom C
N/ACitations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

… 1: This is a 160-bit hash function which resembles the earlier MD5 algo- rithm … of variations such as ECC-DH (ECC Diffie-Hellman), and ECC-DSA (ECC Digital Signature Algorithm) … One of the most common applications for cryptographic algorithms, is in the security of wireless …

Cite

CITATION STYLE

APA

Easttom, C. (2020). Information Assurance/Encryption. In The NICE Cyber Security Framework (pp. 1–30). Springer International Publishing. https://doi.org/10.1007/978-3-030-41987-5_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free