Affiliation:
1. American University of Madaba, Jordan
Abstract
The security of encryption techniques depends a great deal on the proper manipulation of keys during the encryption process. Improper key handling and use may lead to malicious actors being able to predict the key and consequently endanger the security of the data.
Subject
Law,General Computer Science
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献