Thura, Phyo
(Third Local Conference on Parallel and Soft Computing, 2009-08-03)
Two secure end users want to communicate over an
insecure channel. The enemy user is an outsider, listening to
attack the communication. Encryption is the converting
readable information as “plain text” into ...