Senior Project



Team 2
Secure Digital Camera



As presented by:

Michael Nayote
Jason McConney
Walter Lasauskas
Elana R. Shenton




Background
Rules of Evidence
Outline


All information about specific cryptography techniques can be found in:

Computer Networks
By Andrew S. Tanenbaum

Email Us!




1