![Computer security / Cryptographic hash function / Traceability / Cyberwarfare / Technology / Security / Metrology / Application security Computer security / Cryptographic hash function / Traceability / Cyberwarfare / Technology / Security / Metrology / Application security](https://www.pdfsearch.io/img/aa54b7fdac20b7161f656bac40f31829.jpg) Date: 2012-01-26 09:58:39Computer security Cryptographic hash function Traceability Cyberwarfare Technology Security Metrology Application security | | University of Huddersfield Repository Parkinson, Simon, Longstaff, Andrew P., Crampton, Andrew, Allen, Gary, Fletcher, Simon and Myers, Alan The use of Cryptographic Principles within Metrology Software Original CitationAdd to Reading ListSource URL: eprints.hud.ac.ukDownload Document from Source Website File Size: 1,28 MBShare Document on Facebook
|