Security Study and Encryption / Decryption Method
Secure data transmission is done with a technology called encryption. Encryption software scrambles the data with a secret code so that no one can make sense of it while it's being transmitted. When the data reaches its destination, the same software unscrambles the information. Often the obje...
Saved in:
主要作者: | Al-Qdah, Majdi Taysir |
---|---|
格式: | Thesis |
语言: | English English |
出版: |
2000
|
主题: | |
在线阅读: | http://psasir.upm.edu.my/id/eprint/10492/1/FK_2000_26.pdf |
标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
相似书籍
-
Comparative analysis of algorithms used in encryption and decryption /
由: Barahim, Ala'a Ebrahim Abobaker
出版: (2009) -
Novel quantum encryption schemes for secure data transmission and storage /
由: Wu, Hongjun
出版: (1999) -
Securing cover-file of hidden data using statistical technique and AES Encryption Algorithm /
由: Ansaef, Aos.A.Z
出版: (2009) - Enhancement of encryption techniques using elliptic curve cryptography
-
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
由: Rezaeipour, Davood
出版: (2011)