Showing 1 - 6 of 6
these tables of figures. In this paper, we proposed some methods of aggregation based on the hierarchical algorithms. …
Persistent link: https://www.econbiz.de/10009416724
/ deciphering technique as it was implemented thru a Rapid Application Development solution. The algorithms which implement it are …
Persistent link: https://www.econbiz.de/10005668954
Information encryption represents the usage of an algorithm to convert an unknown message into an encrypted one. It is used to protect the data against unauthorized access. Protected data can be stored on a media device or can be transmitted through the network. In this paper we describe a...
Persistent link: https://www.econbiz.de/10008837570
Persistent link: https://www.econbiz.de/10010518934
Persistent link: https://www.econbiz.de/10001412981