Other attributes
Classification Type
Parent Classification
No article content yet.
Timeline
No Timeline data yet.
Further Resources
No Further Resources data yet.
{Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms }