نتایج جستجو برای: key technology

تعداد نتایج: 980060  

Journal: :Computer Science and Application 2017

Journal: :IJACT 2010
Alfred Menezes Berkant Ustaoglu

A party may choose to reuse ephemeral public keys in a Diffie-Hellman key agreement protocol in order to reduce its computational workload or to mitigate against denial-of-service attacks. In this note we highlight the danger of reusing ephemeral keys if domain parameters are not appropriately selected or if public keys are not appropriately validated.

Journal: :DEStech Transactions on Engineering and Technology Research 2017

Journal: :Intelligent Systems in Accounting, Finance and Management 1995

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید