Search

Your search keyword '"asymmetric algorithm"' showing total 16 results

Search Constraints

Start Over You searched for: Descriptor "asymmetric algorithm" Remove constraint Descriptor: "asymmetric algorithm"
16 results on '"asymmetric algorithm"'

Search Results

1. Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks.

4. SECURING COMMUNICATION IN CHATTER APPLICATION.

5. New Subclass Framework and Concrete Examples of Strongly Asymmetric Public Key Agreement.

6. Asymmetric pixel confusion algorithm for images based on RSA and Arnold transform.

7. New Subclass Framework and Concrete Examples of Strongly Asymmetric Public Key Agreement

8. Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization

9. On a class of strongly asymmetric PKA algorithms

10. New Subclass Framework and Concrete Examples of Strongly Asymmetric Public Key Agreement

11. Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization

12. Information security system based on virtual-optics imaging methodology and public key infrastructure

13. HYBRIDIZATION OF RSA AND BLOWFISH CRYPTOGRAPHY ALGORITHMS FOR DATA SECURITY ON CLOUD STORAGE

14. Hibridni kriptosustavi

15. Virtual-optical information security system based on public key infrastructure

16. Information security system based on virtual-optics imaging methodology and public key infrastructure

Catalog

Books, media, physical & digital resources