Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
This paper outlines the usage of RC2 in Microsoft .NET. It provides a basic overview of the RC2 method, along with a review of other popular encryption methods and some sample code which can be used to implement RC2.
Buchanan, W. J. RC2 Encryption and Decryption in Microsoft .NET
Deposit Date | May 30, 2011 |
---|---|
Peer Reviewed | Not Peer Reviewed |
Keywords | RC2: Microsoft .NET; encryption; decryption; data security; privacy; authentication; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/4435 |
security_rc2[1].pdf
(<nobr>116 Kb</nobr>)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
A framework for live host-based Bitcoin wallet forensics and triage
(2022)
Journal Article
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
(2022)
Journal Article
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification
(2022)
Journal Article
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
(2022)
Journal Article
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Advanced Search