Data Encryption Standard

Results: 514



#Item
21LNCSHow to Shuffle in Public

LNCSHow to Shuffle in Public

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:49:44
22A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2  Florida State University

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2010-12-02 09:59:21
23CHAPTER 38 Department of Public Safety (Statutory Authority: 1976 Code §§ 23–6–10 et seq. and 23–47–20(CARTICLE 1

CHAPTER 38 Department of Public Safety (Statutory Authority: 1976 Code §§ 23–6–10 et seq. and 23–47–20(CARTICLE 1

Add to Reading List

Source URL: www.scstatehouse.gov

Language: English - Date: 2016-05-06 09:06:16
24ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-05 03:04:49
25Automatic tool for differential cryptanalysis of SPNs Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Automatic tool for differential cryptanalysis of SPNs Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
26On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2010-12-10 03:09:04
27ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-17 07:58:45
28A Survey for Solving Security Issues in Mobile Computing Sreenubabu Dasari Assistant Professor Department of CSE AITAM, Tekkali.

A Survey for Solving Security Issues in Mobile Computing Sreenubabu Dasari Assistant Professor Department of CSE AITAM, Tekkali.

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-09 06:22:39
29Design & Implementation of Well-Method for Embedded Generation of LPR Numbers Venkateshwarlu Purumala M.Tech, VLSI & Embedded Systems DVR College of Engineering and Technology,

Design & Implementation of Well-Method for Embedded Generation of LPR Numbers Venkateshwarlu Purumala M.Tech, VLSI & Embedded Systems DVR College of Engineering and Technology,

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-04 01:33:51
30The Use of ADP Encryption in Federal Grant Funded Programs Author: John Oblak EF Johnson Technologies Vice President of Standards and Regulatory Affairs Chair TIA TR-8 Committee on Mobile and Personal Private Radio Stand

The Use of ADP Encryption in Federal Grant Funded Programs Author: John Oblak EF Johnson Technologies Vice President of Standards and Regulatory Affairs Chair TIA TR-8 Committee on Mobile and Personal Private Radio Stand

Add to Reading List

Source URL: www.efjohnson.com

Language: English - Date: 2011-08-21 12:33:27