This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet security, which rely heavily on cryptographic ...
Commentary--In recent years, carriers/telephone companies, Internet service providers and others have rolled out managed network security services, which are in use today by hundreds of corporations ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results