×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [unconditional security]
11/21/2015 1. 2 Session Plan Overview of Classical encryption techniques: Symmetric cipher model Substitution Transposition Steganography
220 views
Masato Koashi (Osaka Univ, Creat, Sorst) ,
36 views
Computer and Network Security
33 views
Network Security
18 views
Microdata Sharing Via Pseudonymization
49 views
Randomization Techniques for Multiparty Computation
32 views
< Prev