Screening the covert key using honey encryption to rule out the brute force attack of AES—a survey
Dharshini, P, Arokia Renjith, J, Mohan Kumar, P
Published in Security and communication networks (01.12.2016)
Published in Security and communication networks (01.12.2016)
Get full text
Journal Article