Suggested Topics within your search.
Suggested Topics within your search.
- Cryptography 2
- Data encryption (Computer science) 2
- C++ (Computer program language) 1
- Coding theory 1
- Computer networks—Security measures 1
- Data processing 1
- Data protection 1
- Data protection—Law and legislation 1
- Information technology 1
- Internet of things 1
- Quantitative research 1
- Technology—Sociological aspects 1
- Telecommunication 1
Search alternatives:
"asymmetric key algorithm" » "asymmetric bat algorithm" (Expand Search), "asymmetric 3 algorithm" (Expand Search)
"asymmetric key algorithm" » "asymmetric bat algorithm" (Expand Search), "asymmetric 3 algorithm" (Expand Search)
-
1
Classical and Modern Cryptography for Beginners by Rajkumar Banoth, Rekha Regar.
Published 2023Full text (Wentworth users only)
Electronic eBook -
2
Practical cryptography : algorithms and implementations using C++ / edited by Saiful Azad, Al-Sakib Khan Pathan.
Published 2015Table of Contents: “…Advanced encryption standard / Asif Ur Rahman, Saef Ullah Miah, and Saiful Azad -- chapter 7. Asymmetric key algorithms / Nasrin Sultana and Saiful Azad -- chapter 8. …”
Full text (WIT users only)
Electronic eBook -
3
ICT Analysis and Applications edited by Simon Fong, Nilanjan Dey, Amit Joshi.
Published 2022Table of Contents: “…Analysis of Symmetric and Asymmetric Key Algorithms -- Chapter 14. A Hybrid Approach for retrieving geographic information in Wireless Environment using Indexing Technique -- Chapter 15. …”
Full text (Wentworth users only)
Electronic eBook -
4
CISSP Certification Training Domain 3 / Miller, David.
Published 2015Streaming video (Wentworth users only)
Electronic Video