Accesso libero

Application of the Source Encryption Algorithm Model in the Power Industry

   | 27 gen 2020
INFORMAZIONI SU QUESTO ARTICOLO

Cita

Figure 1.

Symmetric encryption flow chart
Symmetric encryption flow chart

Figure 2.

Asymmetric encryption flowchart
Asymmetric encryption flowchart

Figure 3.

Data conversion mode
Data conversion mode

Figure 4.

Rotation arrangement rule
Rotation arrangement rule

Figure 5.

Data decryption model
Data decryption model

Figure 6.

Data encryption model
Data encryption model

LOCATION VARIABLES

4 southeast9 south2 southwest
3 east5 center7 west
8 northeast1 north6 northwest

TIME VARIOMETER

123456789101112
ABCDEFGHIJKL
1aAaBaCaDaEaFaGaHaIaJakaLa
2bAbBbCbDbEbFbGbHbIbJbkbLb
3cAcBcCcDcEcFcGcHcIcJckcLc
4dAdBdCdDdEdFdGdHdIdJdkdLd
5eAeBeCeDeEeFeGeHeIeJekeLe
6fAfBfCfDfEfFfGfHfIfJfkfLf
7gAgBgCgDgEgFgGgHgIgJgkgLg
8hAhBhChDhEhFhGhHhIhJhkhLh
9iAiBiCiDiEiFiGiHiIiJikiLi
10jAjBjCjDjEjFjGjHjIjJjkjLj
eISSN:
2470-8038
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Computer Sciences, other