Areas:"Ingeniería Telematica" UniversityOCWPlataform:"eduCommons" authors:"Mario Muñoz-Organero"
Categories
1 results found in 17 ms.

Page 1 of 1

| Length: 0
This OER is part of OCW: Coding Techniques
Published under: /Download This Course
Share in: Share this resource in Facebook Share this resource in Twitter Share this resource in LinkedInd Share this resource in Google+ Share this resource in Pinterest Share this resource in Blogger Share this resource in Tumblr

The file is compressed
Used by:
Inherited Tag(s):
Similar courses
  • Description:The objective of this course is to give an overview of different cipher and security techniques as well as their applications to computer networks and telematic services. The student will have to know both symmetric and asymmetric encryption techniques, hash functions, cryptographic checksums, authentication protocols, digital signature, di
  • Description:The objective of this course is to give an overview of different cipher and security techniques as well as their applications to computer networks and telematic services. The student will have to know both symmetric and asymmetric encryption techniques, hash functions, cryptographic checksums, authentication protocols, digital signature, di
  • Description:The objective of this course is to give an overview of different cipher and security techniques as well as their applications to computer networks and telematic services. The student will have to know both symmetric and asymmetric encryption techniques, hash functions, cryptographic checksums, authentication protocols, digital signature, di


1 results found.

Page 1 of 1