Preprint / Version 1

Application of Factorial and Binomial identities in Cybersecurity

##article.authors##

DOI:

https://doi.org/10.31224/2355

Keywords:

cybersecurity

Abstract

This paper focuses on the application of factorial and binomial identities in cybersecurity in connection with the symmetric and asymmetric encryptions.  We can use the binomial identities and theorem in factorials as an effective security algorithm to protect the computing systems, programs, and networks.  

Downloads

Download data is not yet available.

Downloads

Posted

2022-05-18