dc.contributor.author |
Otrok, Hady Ahmad |
|
dc.date.accessioned |
2011-09-28T13:14:12Z |
|
dc.date.available |
2011-09-28T13:14:12Z |
|
dc.date.copyright |
2003 |
en_US |
dc.date.issued |
2011-09-28 |
|
dc.date.submitted |
2003-06-25 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/651 |
|
dc.description |
Includes bibliographical references ( leaves 137-138). |
en_US |
dc.language.iso |
en |
en_US |
dc.subject |
Public key cryptography |
en_US |
dc.subject |
Cryptography |
en_US |
dc.subject |
Data encryption (Computer science) |
en_US |
dc.subject |
Computer security |
en_US |
dc.title |
Security testing and evaluation of cryptography algorithms. (c2003) |
en_US |
dc.type |
Thesis |
en_US |
dc.term.submitted |
Spring |
en_US |
dc.author.degree |
MS in Computer Science |
en_US |
dc.author.school |
Arts and Sciences |
en_US |
dc.author.commembers |
Dr. May Hamdan |
|
dc.author.commembers |
Dr. Abed AI-Nasser EI-Kassar |
|
dc.author.woa |
OA |
en_US |
dc.description.physdesc |
1 bound copy: ii, 138 leaves; ill.; 30 cm. available at RNL. |
en_US |
dc.author.division |
Computer Science |
en_US |
dc.author.advisor |
Dr. Ramzi A. Haraty |
|
dc.identifier.doi |
https://doi.org/10.26756/th.2003.7 |
en_US |
dc.publisher.institution |
Lebanese American University |
en_US |