Visit this resource

Title : Coding Techniques

Title : Coding Techniques

Description : The objective of this course is to give an overview of different cipher and security techniques as well as their applications to computer networks and telematic services. The student will have to know both symmetric and asymmetric encryption techniques, hash functions, cryptographic checksums, authentication protocols, digital signature, digital certificates and applications of all of them.

Description : The objective of this course is to give an overview of different cipher and security techniques as well as their applications to computer networks and telematic services. The student will have to know both symmetric and asymmetric encryption techniques, hash functions, cryptographic checksums, authentication protocols, digital signature, digital certificates and applications of all of them.

Publisher : No publisher

Publisher : No publisher

Dc:creator : ñoz-Organero

Dc:creator : ñoz-Organero

Dc:creator : Francisco Valera-Pintor

Dc:creator : Francisco Valera-Pintor

Dc:creator : án Vidal-Fernández

Dc:creator : án Vidal-Fernández

License : Copyright 2015, UC3M

License : Copyright 2015, UC3M

License :

License :

Language : es

Language : es

Dc:subject : network security

Dc:subject : network security

Dc:subject : cryptography

Dc:subject : cryptography

Dc:subject : ía de Telecomunicación

Dc:subject : ía de Telecomunicación

Dc:subject : security protocols

Dc:subject : security protocols

Dc:subject : security services

Dc:subject : security services

Dc:subject : 2010

Dc:subject : 2010

Dc:subject : ía Telemática

Dc:subject : ía Telemática

Date : 2015-08-05T10:24:13Z

Date : 2015-08-05T10:24:13Z

Type : Curso

Type : Curso

Format : text/html

Format : text/html