Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
This paper outlines the usage of RC2 in Microsoft .NET. It provides a basic overview of the RC2 method, along with a review of other popular encryption methods and some sample code which can be used to implement RC2.
Buchanan, W. J. RC2 Encryption and Decryption in Microsoft .NET
Working Paper Type | Working Paper |
---|---|
Deposit Date | May 30, 2011 |
Peer Reviewed | Not Peer Reviewed |
Keywords | RC2: Microsoft .NET; encryption; decryption; data security; privacy; authentication; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/4435 |
Contract Date | May 30, 2011 |
security_rc2[1].pdf
(116 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
(2023)
Journal Article
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search