[PDF][PDF] Adoption and Analysis of Security Applications to Secure Data Integrity

M Usama, F bin Muhaya, F Akhter - … Information Institute (Tokyo) …, 2013 - researchgate.net
In cryptographic applications, hashing techniques are used for data integrity checking,
authentication and, where digital signatures are involved, to detect modifications during …

[引用][C] Comparative Study of Saellite Image Encryption Algorithm

PK Singh, D Patil - Journal JIIT, 2012