Abstract
Key management, particularly, key generation is one of the important processes in information security. Key generation techniques are variously and selecting one of them or creating new key generation include which types of requirements are also difficult. This paper addresses factors to compare key generation techniques and these factors are used as requirements for key generators.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have