Search Results for Data encryption (Computer science) - Narrowed by: English - Software protectionSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dData$002bencryption$002b$002528Computer$002bscience$002529$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Software$002bprotection$002509Software$002bprotection$0026ps$003d300$0026isd$003dtrue?dt=list2024-05-29T03:30:29ZSubkey generation method for symmetric - key block cryptogaphy using a chaotic mapent://SD_ILS/0/SD_ILS:2037712024-05-29T03:30:29Z2024-05-29T03:30:29Zby Niki Anis Ab. Karim<br/>Author Niki Anis Ab. Karim<br/>Format: Books<br/>Call Number QA76.76.P76 N54 2007<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Sains (Matematik)) - Universiti Teknologi Malaysia, 2007<br/>Foundations of Security What Every Programmer Needs to Knowent://SD_ILS/0/SD_ILS:5180332024-05-29T03:30:29Z2024-05-29T03:30:29Zby Daswani, Neil<br/>Author Daswani, Neil, Kern, Christoph, Kesavan, Anita, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000669<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9781430203773 9781590597842<br/><a href="http://dx.doi.org/10.1007/978-1-4302-0377-3">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Subkey generation method for symmetric - key block cryptogaphy using a chaotic mapent://SD_ILS/0/SD_ILS:5778482024-05-29T03:30:29Z2024-05-29T03:30:29Zby Niki Anis Ab. Karim<br/>Author Niki Anis Ab. Karim<br/>Format: Computer file<br/>Call Number CP 013744<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Sains (Matematik)) - Universiti Teknologi Malaysia, 2007<br/>