Deep search:Searching for "security evaluation" in 'ABSTRACT and KEYWORDGot 2 items.
index Title
1Integrated criteria for covert channel auditing
Author(s):Chang-da WANG, Shi-guang JU  Clicked:5139  Download:3377  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.6 P.737-743  DOI:10.1631/jzus.A071510
2Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
Author(s):Fan Zhang, Zi-yuan Liang, Bo-lin Y...  Clicked:5679  Download:3634  Cited:0  <Full Text>  <PPT> 1559
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1475-1499  DOI:10.1631/FITEE.1800576
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE