A novel network security algorithm based on private key encryption

A Abusukhon, M Talib - … on Cyber Security, Cyber Warfare and …, 2012 - ieeexplore.ieee.org
In cryptographic application, the data sent to a remote host are encrypted first at the source
machine using an encryption key then the encrypted data are sent to the destination …

A novel network security algorithm based on private key encryption

A Abusukhon, M Talib - Proceedings Title: 2012 International Conference on … - infona.pl
In cryptographic application, the data sent to a remote host are encrypted first at the source
machine using an encryption key then the encrypted data are sent to the destination …

[PDF][PDF] A Novel Network Security Algorithm Based on Private Key Encryption

A Abusukhon, M Talib - researchgate.net
In cryptographic application, the data sent to a remote host are encrypted first at the source
machine using an encryption key then the encrypted data are sent to the destination …