Otwarty dostęp

Application of the Source Encryption Algorithm Model in the Power Industry

   | 27 sty 2020

Zacytuj

Figure 1.

Symmetric encryption flow chart
Symmetric encryption flow chart

Figure 2.

Asymmetric encryption flowchart
Asymmetric encryption flowchart

Figure 3.

Data conversion mode
Data conversion mode

Figure 4.

Rotation arrangement rule
Rotation arrangement rule

Figure 5.

Data decryption model
Data decryption model

Figure 6.

Data encryption model
Data encryption model

LOCATION VARIABLES

4 southeast9 south2 southwest
3 east5 center7 west
8 northeast1 north6 northwest

TIME VARIOMETER

123456789101112
ABCDEFGHIJKL
1aAaBaCaDaEaFaGaHaIaJakaLa
2bAbBbCbDbEbFbGbHbIbJbkbLb
3cAcBcCcDcEcFcGcHcIcJckcLc
4dAdBdCdDdEdFdGdHdIdJdkdLd
5eAeBeCeDeEeFeGeHeIeJekeLe
6fAfBfCfDfEfFfGfHfIfJfkfLf
7gAgBgCgDgEgFgGgHgIgJgkgLg
8hAhBhChDhEhFhGhHhIhJhkhLh
9iAiBiCiDiEiFiGiHiIiJikiLi
10jAjBjCjDjEjFjGjHjIjJjkjLj
eISSN:
2470-8038
Język:
Angielski
Częstotliwość wydawania:
4 razy w roku
Dziedziny czasopisma:
Computer Sciences, other