Security Study and Encryption / Decryption Method
Secure data transmission is done with a technology called encryption. Encryption software scrambles the data with a secret code so that no one can make sense of it while it's being transmitted. When the data reaches its destination, the same software unscrambles the information. Often the obje...
Saved in:
Main Author: | Al-Qdah, Majdi Taysir |
---|---|
Format: | Thesis |
Language: | English English |
Published: |
2000
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/10492/1/FK_2000_26.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Comparative analysis of algorithms used in encryption and decryption /
by: Barahim, Ala'a Ebrahim Abobaker
Published: (2009) -
Novel quantum encryption schemes for secure data transmission and storage /
by: Wu, Hongjun
Published: (1999) -
Securing cover-file of hidden data using statistical technique and AES Encryption Algorithm /
by: Ansaef, Aos.A.Z
Published: (2009) - Enhancement of encryption techniques using elliptic curve cryptography
-
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
by: Rezaeipour, Davood
Published: (2011)