This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet security, which rely heavily on cryptographic ...
Commentary--In recent years, carriers/telephone companies, Internet service providers and others have rolled out managed network security services, which are in use today by hundreds of corporations ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results