Amanote Research

Amanote Research

    RegisterSign In

Applied Cryptography: Protocols, Algorithms, and Source Code in C

Computer Law and Security Review - United Kingdom
doi 10.1016/0267-3649(94)90017-5
Full Text
Open PDF
Abstract

Available in full text

Categories
ManagementBusinessComputer NetworksCommunicationsAccountingLaw
Date

September 1, 1994

Authors

Unknown

Publisher

Elsevier BV


Related search

Divertible Protocols and Atomic Proxy Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1998English

Polynomial Structures in Code-Based Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

A Smart Source Code Editor for C

International Journal of Computer Science, Engineering and Information Technology
2014English

Supplemental Information 2: Source Code C#.Net

English

A Survey on Cryptography Algorithms

International Journal of Scientific and Research Publications (IJSRP)
2018English

Applied Cryptography in Infrastructure-Free Wireless Networks

2011English

A Modified High Capacity Video Steganography Technique Based on Spatial Domain Method, Asymmetric Cryptography and Huffman Code Algorithms

Communications on Applied Electronics
2016English

Analysis of Secured Cryptography Algorithms in M-Commerce

International Journal of Computer Applications
2016English

Power Consumption Using Cryptography Algorithms in Cloud Computing

International Journal of Recent Technology and Engineering
EngineeringManagement of TechnologyInnovation
2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy