Vol-3100⫷ Vol-3101 ⫸Vol-3102
urn:nbn:de:0074-3101-0


Vol-3101/Paper31⫷Vol-3101/Paper32
Andrzej SmolarzAndrzej KotyraVasyl SheketaSvitlana ChupakhinaPetro KrulMykola SuprunNadia PasiekaMykola Pasyeka

Using hash functions to protect critical messages from changes in risky computing systems