Advanced cryptographic techniques for computer
Communications of the ACM
Security and privacy in computer systems
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Security considerations in a multi-programmed computer system
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Security and privacy: similarities and differences
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
System implications of information privacy
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Cryptographic techniques for computers
AFIPS '69 (Spring) Proceedings of the May 14-16, 1969, spring joint computer conference
Research in data security: policies and projects
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
Attacking Turkish texts encrypted by homophonic cipher
NEHIPISIC'11 Proceeding of 10th WSEAS international conference on electronics, hardware, wireless and optical communications, and 10th WSEAS international conference on signal processing, robotics and automation, and 3rd WSEAS international conference on nanotechnology, and 2nd WSEAS international conference on Plasma-fusion-nuclear physics
Hi-index | 0.00 |
Computational cryptography deals with the storage and processing of sensitive information in computer systems by enciphering. Sensitive information is information that for one reason or another must be protected from being disclosed to individuals without proper authorization. The need for systems to be secure from unauthorized access to sensitive information has been well documented. Cyrptographic techniques appear to be one of the most simple and secure methods of providing this much needed protection.