Login / Signup

Combined transposition and substitution cryptographic protection of information.

Boncho AleksandrovEftim Kilifarev
Published in: CompSysTech (2000)
Keyphrases
  • information sources
  • higher level
  • database
  • databases
  • case study
  • domain knowledge
  • end users
  • computer systems
  • information seeking
  • sensitive information
  • key management