dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.advisor | Nyberg, Kaisa | |
dc.contributor.author | Vilkki, Miro | |
dc.date.accessioned | 2015-01-07T08:12:22Z | |
dc.date.available | 2015-01-07T08:12:22Z | |
dc.date.issued | 2014-12-07 | |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/14869 | |
dc.format.extent | 27 | |
dc.format.mimetype | application/pdf | en |
dc.language.iso | fi | en |
dc.title | Tor-verkon salausmenetelmät | fi |
dc.type | G1 Kandidaatintyö | fi |
dc.contributor.school | Perustieteiden korkeakoulu | fi |
dc.contributor.department | Tietotekniikan laitos | fi |
dc.subject.keyword | Tor | fi |
dc.subject.keyword | sipulireititys | fi |
dc.subject.keyword | tietoliikenneanalyysi | fi |
dc.subject.keyword | Diffie-Hellman | fi |
dc.subject.keyword | RSA | fi |
dc.subject.keyword | AES | fi |
dc.identifier.urn | URN:NBN:fi:aalto-201501071025 | |
dc.type.dcmitype | text | en |
dc.programme.major | Tietotekniikka | fi |
dc.programme.mcode | SCI3027 | fi |
dc.type.ontasot | Bachelor's thesis | en |
dc.type.ontasot | Kandidaatintyö | fi |
dc.contributor.supervisor | Rousu, Juho | |
dc.programme | Tietotekniikka TIK | fi |
Unless otherwise stated, all rights belong to the author. You may download, display and print this publication for Your own personal use. Commercial use is prohibited.