Amoroso E. 1994, Fundamentals of Computer Security Technology, Prentice Hall
International Editions Diffie W., Hellman M.E., Multiuser cryptography, National Computer Conference, New Zork,
1976 D. Hellman, W. Diffie, Multiuser
cryptography, National Computer Conference New York, 1976 R.L. Rivest, A. Shamir, L. Adleman, On
digital signatures and public-key functions, Comm. Os ACM, 1976 R.L. Rivest, A. Shamir, L. Adleman, A
description of a Single-Chipimplementation of RSA cipher, LAMBDA Magazine
1, 1980 Thomas H. Cormen, Charles E. Leiserson, and Ronald L. Rivest (1990) Introduction to Algorithms, MIT Press, Cambridge MA and McGraw-Hill, New York. Donald Knuth, The Art of Computer Programming, Volume 3: Sorting and Searching, Addison-Wesley, 1973. https://builtin.com/blockchain/blockchain-cybersecurity-uses https://www.cm-alliance.com/cybersecurity-blog/the-future-use-cases-of-blockchain-for-cybersecurity https://www.apriorit.com/dev-blog/462-blockchain-cybersecurity-pros-cons https://www.intechopen.com/books/computer-security-threats/blockchain-applications-in-cybersecurity https://guggero.github.io/blockchain-demo/#!/
Erasmus+ Programme – Strategic Partnership Project Nr: 2018-1-RO01-KA203-049510.
Erasmus+ Programme – Strategic Partnership Project Number: 2020-1-RO01-KA203-080368.
The information and views set out in this platform are those of the author(s) and do not necessarily reflect the official opinion of the European Union. Neither the European Union institutions and bodies nor any person acting on their behalf may be held responsible for the use which may be made of the information contained therein.