Senior Project
Team 2
Secure Digital Camera
As presented by:
Michael Nayote
Jason McConney
Walter Lasauskas
Elana R. Shenton
Background
Rules of Evidence
Outline
All information about specific cryptography techniques can be found in:
Computer Networks
By Andrew S. Tanenbaum
Email Us!