Abstract

Key management, particularly, key generation is one of the important processes in information security. Key generation techniques are variously and selecting one of them or creating new key generation include which types of requirements are also difficult. This paper addresses factors to compare key generation techniques and these factors are used as requirements for key generators.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call