Showing 1 - 3 of 3
these tables of figures. In this paper, we proposed some methods of aggregation based on the hierarchical algorithms. …
Persistent link: https://www.econbiz.de/10009416724
Information encryption represents the usage of an algorithm to convert an unknown message into an encrypted one. It is used to protect the data against unauthorized access. Protected data can be stored on a media device or can be transmitted through the network. In this paper we describe a...
Persistent link: https://www.econbiz.de/10008837570
/ deciphering technique as it was implemented thru a Rapid Application Development solution. The algorithms which implement it are …
Persistent link: https://www.econbiz.de/10005668954