| 000 | 017550000a22003490004500 | ||
|---|---|---|---|
| 003 | EG-GICUC | ||
| 005 | 20250223030758.0 | ||
| 008 | 060917s2006 ua a f m 000 0 eng d | ||
| 040 |
_aEG-GICUC _beng _cEG-GICUC |
||
| 041 | 0 | _aEng | |
| 049 | _aDeposite | ||
| 097 | _aM.Sc | ||
| 099 | _aCai01.20.03.M.Sc.2006.Yo.P. | ||
| 100 | 0 | _aYousra Mohamed Sabry | |
| 245 | 1 | 0 |
_aprivacy , authentication , and key management of ipsec protocol / _cYousra Mohamed Sabry ; Suppervised Salwa Saad Algamal , Tarek Abd El Mageed Abd El Aziz , Amr Ahmad Ali Badr |
| 246 | 1 | 5 | _aتامين بروتوكولات الانترنت من خلال انظمة تحقيق الخصوصية والمصداقية وادارة المفاتيح |
| 260 |
_aCairo : _bYousra Mohamed Sabry , _c2006 |
||
| 300 |
_a207P : _bill ; _c30cm |
||
| 502 | _aThesis (M.Sc.) - Cairo University - Faculty Of Computers and Information - Department Of Computer Science | ||
| 520 | _aAs the Internet evolves from an academic and research network into a commercial network , more and more organizations and individuals are connecting their internal networks and computers to itThe secrecy and integrity of the data transmitted over the Internet have become a primary concern , and cryptographic data encryption and authentication constitute the tools to address this concern | ||
| 530 | _aIssued also as CD | ||
| 653 | 4 | _aAuthenticatio | |
| 653 | 4 | _aCommercisal network | |
| 653 | 4 | _aIpsec protocol | |
| 700 | 0 |
_aAmr Ahmad Ali Badr , _eSupervisor |
|
| 700 | 0 |
_aSalwa Saad Algamal , _eSupervisor |
|
| 700 | 0 |
_aTarek Abd El Mageed Abd El Aziz , _eSupervisor |
|
| 856 | _uhttp://172.23.153.220/th.pdf | ||
| 905 |
_aEsam _eRevisor |
||
| 905 |
_aFayza _eCataloger |
||
| 942 |
_2ddc _cTH |
||
| 999 |
_c41777 _d41777 |
||