From post

NMACA Approach Used to Build a Secure Message Authentication Code.

, , , и . FGIT-SecTech/DRBC, том 122 из Communications in Computer and Information Science, стр. 290-298. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем