Security testing and evaluation of cryptography algorithms. (c2003)
Includes bibliographical references ( leaves 137-138).
Saved in:
| Main Author: | |
|---|---|
| Format: | masterThesis |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/10725/651 https://doi.org/10.26756/th.2003.7 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1864513454563393537 |
|---|---|
| author | Otrok, Hady Ahmad |
| author_facet | Otrok, Hady Ahmad |
| author_role | author |
| dc.creator.none.fl_str_mv | Otrok, Hady Ahmad |
| dc.date.none.fl_str_mv | 2003 2003-06-25 2011-09-28T13:14:12Z 2011-09-28T13:14:12Z 2011-09-28 |
| dc.identifier.none.fl_str_mv | http://hdl.handle.net/10725/651 https://doi.org/10.26756/th.2003.7 |
| dc.language.none.fl_str_mv | en |
| dc.publisher.none.fl_str_mv | Lebanese American University |
| dc.rights.*.fl_str_mv | info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Public key cryptography Cryptography Data encryption (Computer science) Computer security |
| dc.title.none.fl_str_mv | Security testing and evaluation of cryptography algorithms. (c2003) |
| dc.type.none.fl_str_mv | Thesis info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/masterThesis |
| description | Includes bibliographical references ( leaves 137-138). |
| eu_rights_str_mv | openAccess |
| format | masterThesis |
| id | LAURepo_fd2ce7e79de5f8b30d2d910bfa847d04 |
| language_invalid_str_mv | en |
| network_acronym_str | LAURepo |
| network_name_str | Lebanese American University repository |
| oai_identifier_str | oai:laur.lau.edu.lb:10725/651 |
| publishDate | 2003 |
| publisher.none.fl_str_mv | Lebanese American University |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| spelling | Security testing and evaluation of cryptography algorithms. (c2003)Otrok, Hady AhmadPublic key cryptographyCryptographyData encryption (Computer science)Computer securityIncludes bibliographical references ( leaves 137-138).1 bound copy: ii, 138 leaves; ill.; 30 cm. available at RNL.Lebanese American University2011-09-28T13:14:12Z2011-09-28T13:14:12Z20032011-09-282003-06-25Thesisinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesishttp://hdl.handle.net/10725/651https://doi.org/10.26756/th.2003.7eninfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/6512020-05-18T14:53:45Z |
| spellingShingle | Security testing and evaluation of cryptography algorithms. (c2003) Otrok, Hady Ahmad Public key cryptography Cryptography Data encryption (Computer science) Computer security |
| status_str | publishedVersion |
| title | Security testing and evaluation of cryptography algorithms. (c2003) |
| title_full | Security testing and evaluation of cryptography algorithms. (c2003) |
| title_fullStr | Security testing and evaluation of cryptography algorithms. (c2003) |
| title_full_unstemmed | Security testing and evaluation of cryptography algorithms. (c2003) |
| title_short | Security testing and evaluation of cryptography algorithms. (c2003) |
| title_sort | Security testing and evaluation of cryptography algorithms. (c2003) |
| topic | Public key cryptography Cryptography Data encryption (Computer science) Computer security |
| url | http://hdl.handle.net/10725/651 https://doi.org/10.26756/th.2003.7 |