SHA Encryption System

In the world of information technology, cryptography is a must for hiding the real meaning of information from unauthorized users. Secure Hash Standards are commonly used in generating digital signature. SHA-1 and SHA-256 are algorithms specified in Secure Hash Standard. SHA-1and SHA-256...

Full description

Saved in:
Bibliographic Details
Main Author: Tan , Su Ning
Format: Monograph
Published: UTeM 2010
Subjects:
Online Access:http://library.utem.edu.my:8000/elmu/index.jsp?module=webopac-d&action=fullDisplayRetriever.jsp&szMaterialNo=0000063249
http://library.utem.edu.my:8000/elmu/index.jsp?module=webopac-d&action=fullDisplayRetriever.jsp&szMaterialNo=0000063249
http://eprints.utem.edu.my/2491/1/Sha_Encryption_System_Tan_Su_Ning_QA76.9.A25.T38_2010_-_24_pages.pdf
http://eprints.utem.edu.my/2491/2/Sha_Encryption_System_Tan_Su_Ning_QA76.9.A25.T38_2010.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first