Skip to main content

2003 | OriginalPaper | Buchkapitel

Hash Algorithms and Security Applications

verfasst von : Máire McLoone, John V. McCanny

Erschienen in: System-on-Chip Architectures and Implementations for Private-Key Data Encryption

Verlag: Springer US

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

The security services required to guarantee a fully protected networking system are [76, 29]: Confidentiality - protecting the data from disclosure to unauthorised bodiesAuthentication - assuring that received data was indeed transmitted by the body identified as the sourceIntegrity - maintaining data consistency and ensuring that data has not been altered by unauthorised personsNon-repudiation - preventing the originator of a message from denying transmission

Metadaten
Titel
Hash Algorithms and Security Applications
verfasst von
Máire McLoone
John V. McCanny
Copyright-Jahr
2003
Verlag
Springer US
DOI
https://doi.org/10.1007/978-1-4615-0043-8_5

Premium Partner