L'édition de cet ISBN n'est malheureusement plus disponible.
Afficher les exemplaires de cette édition ISBNLes informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Frais de port :
EUR 11,69
De Royaume-Uni vers Etats-Unis
Description du livre Etat : New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. N° de réf. du vendeur ria9783639375657_lsuk
Description du livre PF. Etat : New. N° de réf. du vendeur 6666-IUK-9783639375657
Description du livre Etat : New. N° de réf. du vendeur ABLING22Oct2817100458252
Description du livre Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The security of the cryptographic techniques heavily relies on strong encryption and decryption algorithms and increased complexity associated to the algorithms. In this book the plaintext message is converted to the ciphertext message by using both RSA as asymmetric key algorithm and one-time pad as symmetric key algorithm. Three levels of encryption processes are imposed to produce a ciphertext which for sending to the receiver. First, the original message is encrypted by the private key of RSA algorithm of the sender then the output of the first encryption is again encrypted with the public key RSA algorithm of the receiver and finally the output of the second encryption is further encrypted by a shared secret key of one-time pad algorithm. After the above three encryptions a final ciphertext is generated and then sent to the receiver through the communication channels. 80 pp. Englisch. N° de réf. du vendeur 9783639375657
Description du livre PAP. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L0-9783639375657
Description du livre Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The security of the cryptographic techniques heavily relies on strong encryption and decryption algorithms and increased complexity associated to the algorithms. In this book the plaintext message is converted to the ciphertext message by using both RSA as asymmetric key algorithm and one-time pad as symmetric key algorithm. Three levels of encryption processes are imposed to produce a ciphertext which for sending to the receiver. First, the original message is encrypted by the private key of RSA algorithm of the sender then the output of the first encryption is again encrypted with the public key RSA algorithm of the receiver and finally the output of the second encryption is further encrypted by a shared secret key of one-time pad algorithm. After the above three encryptions a final ciphertext is generated and then sent to the receiver through the communication channels. N° de réf. du vendeur 9783639375657
Description du livre PAP. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L0-9783639375657
Description du livre Kartoniert / Broschiert. Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Rahman AnisurAnisur Rahman is a Senior Lecturer in Computer Science & Engineering Department at Daffodil International University. He has an MSc in Computer Science & Engineering from Daffodil International University. His interst. N° de réf. du vendeur 4982071