Image from Google Jackets

A newly established symmetric key encryption algorithm for small amount of data

By: Contributor(s): Material type: Mixed materialsMixed materialsPublication details: 2013Description: 60-65Subject(s): NLM classification:
  • 004
In: IUP: JOURNAL OF INFORMATION TECHNOLOGYMSummary: during data transmission between the source and the destination in a computer network, the data is exposed to external modifications with malicious intentions. Cryptography is widely used to protect sensitive data from unauthorized access and modifications while on transit. There are various forms of cryptographic algorithms used in computer communications and are broadly divided into two types- symmetric key and asymmetric key.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Vol info Status Date due Barcode
Periodicals/Magazines Periodicals/Magazines SSCBS Library 8/4 Available P14782

during data transmission between the source and the destination in a computer network, the data is exposed to external modifications with malicious intentions. Cryptography is widely used to protect sensitive data from unauthorized access and modifications while on transit. There are various forms of cryptographic algorithms used in computer communications and are broadly divided into two types- symmetric key and asymmetric key.

There are no comments on this title.

to post a comment.

Shaheed Sukhdev College of Business Studies Library
E-mail: library@sscbsdu.ac.in
Visitor Counter:- Visitor counter
Implemented & Customized by: BestBookBuddies

Powered by Koha