What people are saying - Write a review
We haven't found any reviews in the usual places.
APPLICATIONS OF CRYPTOGRAPHY
6 other sections not shown
Other editions - View all
access attributes access control access control mechanism access lists access rights algorithm block Block cipher called capability list ciphertext communicant communication components computer network computer system confidential connection CRYPTO cryptographic keys cryptosystems database decryption defined deleted digital signature elements enciphering entity authentication entity identity established executed FDCS feedback File Transfer identification number implemented integrity intruder key distribution Key exchange protocol key schedule layer message authentication method modules mutual authentication network resources network security mechanism network security services network users NSAP NSAP open system object open system operations OSI model parameters Passl password peer entity peer-to-peer plaintext possible problem procedure protection mechanism query random number receiver replay request S-boxes scheme secret key secure computer network security category Security Information Base Security Manager sender sends sequence number session key SM.A SM.B Step stream cipher subnetwork tion traffic analysis triggers tuple verified