• No results found

An application of data encryption technique using random number generator

N/A
N/A
Protected

Academic year: 2020

Share "An application of data encryption technique using random number generator"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1. Symmetric-key cryptography, where the same key is used both for encryption and decryption (Chandra Sekhar, Sudha, & Prasad Reddy, 2007)

References

Related documents

The theoretical concerns that should be addressed so that the proposed inter-mated breeding program can be effectively used are as follows: (1) the minimum sam- ple size that

According to the aforementioned issues, seven research questions were raised in this study, in which the emphasis of each components of sustainable development, such as the

Although the waves do not phase lock, positive vorticity centers amplify whenever the cross-equatorial motion of the WMRG wave lies at the same longitude in the upper

[87] demonstrated the use of time-resolved fluorescence measurements to study the enhanced FRET efficiency and increased fluorescent lifetime of immobi- lized quantum dots on a

Published by the Government Accountability (GAO) Office, one of the most visible public reporting efforts of antipsychotic medication treatment among youth was the 2008

First, I build on previous evidence by Chevalier and Marie (2017) on the East German fertility decline, but in contrast to these authors, I exploit exogenous variation in women’s

In accor- dance with previous reports [27,15], the present study showed that microglial cell activation and increased TNF-a cytokine levels were involved in ALS pathologies