Click here to Skip to main content
15,889,266 members
Articles
(untagged)

Biological Studies as the Basis of Encryption

Rate me:
Please Sign up or sign in to vote.
3.50/5 (29 votes)
29 May 2013CPOL4 min read 44.8K   17  
Encryption methods using biological basis. As with many technologies, the first announcements do not make many waves and it takes time for the mainstream media to understand the significance of such announcements and separate them from all the other noise.

Views

Daily Counts

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


Written By
Cyprus Cyprus
Chad Z. Hower, a.k.a. Kudzu
"Programming is an art form that fights back"

I am a former Microsoft Regional DPE (MEA) covering 85 countries, former Microsoft Regional Director, and 10 Year Microsoft MVP.

I have lived in Bulgaria, Canada, Cyprus, Switzerland, France, Jordan, Russia, Turkey, The Caribbean, and USA.

Creator of Indy, IntraWeb, COSMOS, X#, CrossTalk, and more.

Comments and Discussions