Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Stream cipher based key derivation function
Chuah Chai Wen; Edward Dawson; Leonie Simpson
International Journal of Security and Networks (IJSN), 2017 Vol.12 No.2, pp.70 - 82
1 + 9 =

Thank you for your feedback.