Cryptographic wiretapping at 100 megabits
暂无分享,去创建一个
Peter Honeyman | Charles J. Antonelli | Kevin Coffman | J. Bruce Fields | C. J. Antonelli | P. Honeyman | Kevin Coffman | J. Fields
[1] Joe Kilian,et al. How to Protect DES Against Exhaustive Key Search , 1996, CRYPTO.
[2] Peter Honeyman,et al. The Packet Vault: Secure Storage of Network Data , 1999, Workshop on Intrusion Detection and Network Monitoring.
[3] Prashant J. Shenoy,et al. Rules of thumb in data engineering , 2000, Proceedings of 16th International Conference on Data Engineering (Cat. No.00CB37073).
[4] Cormac J. Sreenan,et al. mmdump: a tool for monitoring internet multimedia traffic , 2000, CCRV.
[5] Robert D. Silverman. A Cost-Based Security Analysis of Symmetric and Asymmetric Key Lengths RSA Labs bulletin , 2000 .
[6] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Public Key Cryptography.