This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
Search
Skip to Search Results-
2011-01-01
The internet is growing rapidly and as a matter of fact, the number of devices connected to the internet are now more than the people on this planet. There is certainly an increase in the popularity of video-based communication in health, military and commercial sectors which may have some...
-
2021-10-28
General Security Concepts, Preface: Systems Administrators, Security Administrators, Network Administrators; whatever title they have, they are tasked with building, maintaining and most importantly, protecting the IT systems from malicious software, intentional intrusions from both internal and...
-
2016-05-02
The Rivest Shamir Adelman (RSA) is a popular cryptosystem. Mainly used for its easy implementation in securing data transmissions. In RSA cryptography, two different keys are used; a private and public key. The public keys can be shared with everyone where the private key is a secret. RSA has...