Showing 1 - 1 of 1
The transfer of information by telecommunication channels is accompanied by message hashing to control the integrity of the data and confirm the authenticity of the data. When using a reliable hash function, it is computationally difficult to create a fake message with a pre-existing hash code,...
Persistent link: https://www.econbiz.de/10014361420