Categories
1 results found in 11 ms.
Page 1 of 1
File: chapter1-ocw.pdf
This OER is part of OCW: Coding Techniques
Published under: /lectures
Share in:
OCW Authors:
Inherited Tag(s):
- ingeniería telematica
- security services
- security protocols
- network security
- cryptography
- ingeniería telemática
Similar courses
-
Description:The objective of this course is to give an overview of different cipher and security techniques as well as their applications to computer networks and telematic services. The student will have to know both symmetric and asymmetric encryption techniques, hash functions, cryptographic checksums, authentication protocols, digital signature, di
-
Description:The objective of this course is to give an overview of different cipher and security techniques as well as their applications to computer networks and telematic services. The student will have to know both symmetric and asymmetric encryption techniques, hash functions, cryptographic checksums, authentication protocols, digital signature, di
-
Description:The objective of this course is to give an overview of different cipher and security techniques as well as their applications to computer networks and telematic services. The student will have to know both symmetric and asymmetric encryption techniques, hash functions, cryptographic checksums, authentication protocols, digital signature, di
1 results found.
Page 1 of 1