Search Results - (( software certification using algorithm ) OR ( java application stemming algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1
  2. 2

    Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure by Nayeem Ahmad, Khan, Adnan Shahid, Khan, Seleviawati, Tarmizi, Azlina, Ahmadi Julaihi, Zeeshan, Ahmad

    Published 2022
    “…These protocols have been successfully used to protect World Wide Web communication between a client and a server that has been encoded using the HTTP protocol for many years. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  3. 3
  4. 4