Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
TCP protocol can be used in the transmission of data from one host to another host. Simply, it is unsecure because the attacker can break security parameters to obtain access to the data that currently being sent. As a communication and transmission of files over Internet has increased exponentially...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2015
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/68687/1/68687.pdf https://ir.uitm.edu.my/id/eprint/68687/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!