Categories
1 results found in 17 ms.
Page 1 of 1
File: coding-techniques.zip
This OER is part of OCW: Coding Techniques
Published under: /Download This Course
Share in:
Used by:
Inherited Tag(s):
- ingeniería telematica
- security services
- security protocols
- network security
- cryptography
- ingeniería telemática
Similar courses
-
Description:The objective of this course is to give an overview of different cipher and security techniques as well as their applications to computer networks and telematic services. The student will have to know both symmetric and asymmetric encryption techniques, hash functions, cryptographic checksums, authentication protocols, digital signature, di
-
Description:The objective of this course is to give an overview of different cipher and security techniques as well as their applications to computer networks and telematic services. The student will have to know both symmetric and asymmetric encryption techniques, hash functions, cryptographic checksums, authentication protocols, digital signature, di
-
Description:The objective of this course is to give an overview of different cipher and security techniques as well as their applications to computer networks and telematic services. The student will have to know both symmetric and asymmetric encryption techniques, hash functions, cryptographic checksums, authentication protocols, digital signature, di
1 results found.
Page 1 of 1