Implementation of Blom's key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.]

Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom's Key pre-distribution uses an integer finite field which makes this scheme easy to be inte...

Full description

Saved in:
Bibliographic Details
Main Authors: Udin, Md Nizam (Author), Mohd Amin, Farah Azaliney (Author), Abdul Malek, Aminah (Author), Zulkifili, Nur Annisa (Author), Ghazali, Nur Atiqah (Author), Mohd Ridzuwan, Siti Aisyah (Author)
Format: Book
Published: Penerbit UiTM, 2021-10.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

Internet

Link Metadata

3rd Floor Main Library

Holdings details from 3rd Floor Main Library
Call Number: A1234.567
Copy 1 Available