Amanote Research
Register
Sign In
“Encryption Process” (Verschlüsselungsverfahren)
IIC International Review of Intellectual Property and Competition Law
- Germany
doi 10.1007/s40319-013-0135-1
Full Text
Open PDF
Abstract
Available in
full text
Categories
Law
International Relations
Political Science
Date
November 19, 2013
Authors
Unknown
Publisher
Springer Science and Business Media LLC
Related search
Design Hybrid Encryption System Based on E0 Algorithm and A5/3 Algorithm in the Encryption Process
Al-Qadisiyah Journal Of Pure Science
General Certificateless Encryption and Timed-Release Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Voice Mail Encryption Using International Data Encryption Algorithm
The International Conference on Electrical Engineering
Parallel Homomorphic Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Generic Construction of Certificate-Based Encryption From Certificateless Encryption Revisited
Computer Journal
Computer Science
Data Encryption Standard
Attacking Triple Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Identity-Based Encryption
Multi-Level Encryption Framework
International Journal of Advanced Computer Science and Applications
Computer Science