Amanote Research
Register
Sign In
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Computer Law and Security Review
- United Kingdom
doi 10.1016/0267-3649(94)90017-5
Full Text
Open PDF
Abstract
Available in
full text
Categories
Management
Business
Computer Networks
Communications
Accounting
Law
Date
September 1, 1994
Authors
Unknown
Publisher
Elsevier BV
Related search
Divertible Protocols and Atomic Proxy Cryptography
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Polynomial Structures in Code-Based Cryptography
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
A Smart Source Code Editor for C
International Journal of Computer Science, Engineering and Information Technology
Supplemental Information 2: Source Code C#.Net
A Survey on Cryptography Algorithms
International Journal of Scientific and Research Publications (IJSRP)
Applied Cryptography in Infrastructure-Free Wireless Networks
A Modified High Capacity Video Steganography Technique Based on Spatial Domain Method, Asymmetric Cryptography and Huffman Code Algorithms
Communications on Applied Electronics
Analysis of Secured Cryptography Algorithms in M-Commerce
International Journal of Computer Applications
Power Consumption Using Cryptography Algorithms in Cloud Computing
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation