Login / Signup
Combined transposition and substitution cryptographic protection of information.
Boncho Aleksandrov
Eftim Kilifarev
Published in:
CompSysTech (2000)
Keyphrases
</>
information sources
higher level
database
databases
case study
domain knowledge
end users
computer systems
information seeking
sensitive information
key management