A Abusukhon, M Talib - Proceedings Title: 2012 International Conference on … - infona.pl
In cryptographic application, the data sent to a remote host are encrypted first at the source
machine using an encryption key then the encrypted data are sent to the destination …