Author:
A.Abdo ,Karamany Taghreed S.,Yakoub Ahmed
Reference42 articles.
1. A Cryptosystem for Database Security Based on RC4 Algorithm;Abdulameer;Journal of Al-Qadisiyah for Computer Science and Mathematics,2023
2. Advanced encryption standard (AES) algorithm to encrypt and decrypt data;Abdullah;Cryptography and Network Security,2017
3. Performance Evaluation of Data Compression Algorithms for IoT-Based Smart Water Network Management Applications;Adedeji;Journal of Applied Science & Process Engineering,2020
4. Akashdeep Bhardwaj, G.V.B. Subrahmanyam, Vinay Avasthi and Hanumat Sastry “Security Algorithms for Cloud Computing, ”International Conference on Computational Modeling and Security (CMS), vol.85, pp. 535-542, 2016.doi: 10.1016/j.procs.2016.05.215.
5. Al-Amri, R. M., Hamood, D. N., & Farhan, A. K. “Theoretical Background of Cryptography, ”Mesopotamian Journal of Cyber Security, Vol.2023, pp. 7–15, 2023.doi:10.58496/MJCS/2023/002.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献