Search Results for Data encryption (Computer science) - Narrowed by: English - Software protection SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Software$002bprotection$002509Software$002bprotection$0026ps$003d300$0026isd$003dtrue?dt=list 2024-05-29T03:30:29Z Subkey generation method for symmetric - key block cryptogaphy using a chaotic map ent://SD_ILS/0/SD_ILS:203771 2024-05-29T03:30:29Z 2024-05-29T03:30:29Z by&#160;Niki Anis Ab. Karim<br/>Author&#160;Niki Anis Ab. Karim<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.P76 N54 2007<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Sains (Matematik)) - Universiti Teknologi Malaysia, 2007<br/> Foundations of Security What Every Programmer Needs to Know ent://SD_ILS/0/SD_ILS:518033 2024-05-29T03:30:29Z 2024-05-29T03:30:29Z by&#160;Daswani, Neil<br/>Author&#160;Daswani, Neil,&#160;Kern, Christoph,&#160;Kesavan, Anita,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000669<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781430203773&#160;9781590597842<br/><a href="http://dx.doi.org/10.1007/978-1-4302-0377-3">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Subkey generation method for symmetric - key block cryptogaphy using a chaotic map ent://SD_ILS/0/SD_ILS:577848 2024-05-29T03:30:29Z 2024-05-29T03:30:29Z by&#160;Niki Anis Ab. Karim<br/>Author&#160;Niki Anis Ab. Karim<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 013744<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Sains (Matematik)) - Universiti Teknologi Malaysia, 2007<br/>