Browsing by Subject "Data encryption (Computer science)"
Now showing items 1-2 of 2
-
(2007-06-26)Department: Computer ScienceThe rapid wireless technology development and wide wireless networks deployment provide to us emerging composite networks permeated by wireless communications. The current Internet will remain and serve as the ``communication ...
-
(2007-08-06)Department: Electrical EngineeringTrustworthy computer systems protect the access of sensitive information by an unauthorized agent (i.e., an attacker). However, security vulnerabilities exist which can allow a system to be compromised by an attacker. An ...