Data Security. 1. Concepts 2. Secret key methods 3. Public key methods 4. Protocols I. 5. Protocols II

1 Data Security 1. Concepts 2. Secret key methods 3. Public key methods 4. Protocols I. 5. Protocols II.2 Data Security: Access Control A Rossz tal&aa...
Author:  Pál Szekeres

46 downloads 207 Views 152KB Size