2003 | OriginalPaper | Buchkapitel
Hash Algorithms and Security Applications
verfasst von : Máire McLoone, John V. McCanny
Erschienen in: System-on-Chip Architectures and Implementations for Private-Key Data Encryption
Verlag: Springer US
Enthalten in: Professional Book Archive
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
The security services required to guarantee a fully protected networking system are [76, 29]: Confidentiality - protecting the data from disclosure to unauthorised bodiesAuthentication - assuring that received data was indeed transmitted by the body identified as the sourceIntegrity - maintaining data consistency and ensuring that data has not been altered by unauthorised personsNon-repudiation - preventing the originator of a message from denying transmission