2023
DOI: 10.1007/978-3-031-20734-1_3
|View full text |Cite
|
Sign up to set email alerts
|

Social Media, Digital Methods and Critical Security Studies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 61 publications
0
1
0
Order By: Relevance
“…In recent years, selfdestructing or disappearing texts have gained traction and become more accessible to many users. The size and sensitivity of data transferred across the Internet continue to grow, emphasizing the increasing importance of network security [8]. The Data Encryption Standard (DES) encryption technique has its origins in the LUCIFER Feistel block cipher, developed in 1971 by IBM cryptography expert Horst Feistel [9].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, selfdestructing or disappearing texts have gained traction and become more accessible to many users. The size and sensitivity of data transferred across the Internet continue to grow, emphasizing the increasing importance of network security [8]. The Data Encryption Standard (DES) encryption technique has its origins in the LUCIFER Feistel block cipher, developed in 1971 by IBM cryptography expert Horst Feistel [9].…”
Section: Introductionmentioning
confidence: 99%