Information technology. Security techniques. Message authentication codes MACs - Mechanisms using a dedicated hash-function from other stores
-
Information technology. Securi...
Information technology. Security techniques. Message Authentication Codes (MAC...
Information technology. Security techniques. Message Authentication Codes (MACs) - Mechanisms using a dedicated hash-function
more
-
Information technology. Securi...
Information technology. Security techniques. Message authentication codes (MAC...
Information technology. Security techniques. Message authentication codes (MACs) - Mechanisms using a dedicated hash-function
more
-
Information technology. Securi...
Information technology. Security techniques. Message Authentication Codes (MAC...
Information technology. Security techniques. Message Authentication Codes (MACs) - Mechanisms using a universal hash-function
more
-
Information technology. Securi...
Information technology. Security techniques. Message Authentication Codes (MAC...
Information technology. Security techniques. Message Authentication Codes (MACs) - Mechanisms using a block cipher
more
-
Information technology. Securi...
Information technology. Security techniques. Digital signature schemes giving ...
Information technology. Security techniques. Digital signature schemes giving message recovery - Mechanisms using a hash-function
more
-
BS ISO/IEC 9797-3:2011+A1:2020
Information technology. Security techniques. Message Authentication Codes (MAC...
Information technology. Security techniques. Message Authentication Codes (MACs). Mechanisms using a universal hash-function|Information exchange, Coding (programming), Light-duty, Data processing, Cryptography, Data security, Messages, Verification,...
more
-
BS ISO/IEC 29192-6:2019
Information technology. Lightweight cryptography. Message authentication codes...
Information technology. Lightweight cryptography. Message authentication codes (MACs)|Programming techniques, Security personnel, Authentication, Cryptography, Information technology
more
-
BS ISO/IEC 20008-2:2013+A1:202...
Information technology. Security techniques. Anonymous digital signatures. Mec...
Information technology. Security techniques. Anonymous digital signatures. Mechanisms using a group public key|Digital signatures, Data storage protection, Numeric codes, Messages, Verification, Codes, Data transmission, Decoding, Information exchange,...
more
Items per page