Analysis of secure hash Functions Attack and Deffense
Mohamed Elbassiouny Mohamed Abouealla;
Other data
| Title | Analysis of secure hash Functions Attack and Deffense | Other Titles | تحليل طرق هجوم وتحصين الدوال الآمنه المبعثره للبيانات | Authors | Mohamed Elbassiouny Mohamed Abouealla | Keywords | Analysis of secure hash Functions Attack and Deffense | Issue Date | 2006 |
Recommend this item
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.