Browsing by Subject "Encryption"

Sort by: Order: Results:

  • Malik, Sachin; Shanmugam, Bharanidharan; Kannorpatti, Krishnan; Azam, Sami (2022-03-24)
    It has been nearly three decades since the first strain of ransomware surfaced online, but still, it is one of the most destructive malwares of all time, costing millions of dollars around the globe each year. Ransomware ...
  • Khan,Salman A. (2015)
    Playfair cipher is an interesting data encryption technique with a medium level of complexity, and therefore, is suitable for security of wireless and mobile systems. Different sizes of the matrices used for key have been ...
  • Hammood , Maytham M.; Yoshigoe ,Kenji; Sagheer, Ali M. (2015)
    Wireless communication security is a critical factor for secure communication among large scale of wireless networks. A limited resource constraint, such as power and memory size presents a significant challenge to implement ...
  • Croock, Muayad Sadik (2022-03-09)
    It is well known that nowadays the security issues in the information system are increased in noticed way. These issues include the hardware and software sides, in terms of data or information as well as the devices. One ...
  • Al-anni, Maad Kamal; Almuttairi, Rafah M.; Alsaadi, Husam Ibrahiem Husain (2020-11-01)
    obliquely, the obfuscation becomes the vital mannerism for preserving the surreptitious data, so far it is necessary to pay more attention to the art of hiding important images for the purpose of sending crucial decisions ...

All Journals

Browse

Administrator Account