@dblp

Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.

, , , и . ATC, том 4610 из Lecture Notes in Computer Science, стр. 410-419. Springer, (2007)

Линки и ресурсы

тэги