Showing 1 - 10 of 60
Persistent link: https://www.econbiz.de/10000816856
Persistent link: https://www.econbiz.de/10001644147
Persistent link: https://www.econbiz.de/10000767724
Persistent link: https://www.econbiz.de/10000773763
Persistent link: https://www.econbiz.de/10000781933
Persistent link: https://www.econbiz.de/10000817933
Persistent link: https://www.econbiz.de/10001056523
these tables of figures. In this paper, we proposed some methods of aggregation based on the hierarchical algorithms. …
Persistent link: https://www.econbiz.de/10009416724
Information encryption represents the usage of an algorithm to convert an unknown message into an encrypted one. It is … through the network. In this paper we describe a concrete implementation of the AES algorithm in the Java programming language … asymmetric key encryption algorithm formally adopted by the U.S. government and was elected after a long process of …
Persistent link: https://www.econbiz.de/10008837570
/ deciphering technique as it was implemented thru a Rapid Application Development solution. The algorithms which implement it are …
Persistent link: https://www.econbiz.de/10005668954