Author:
Reyad Omar,Mansour Hanaa M.,Heshmat Mohamed,Zanaty Elnomery A.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A novel substantial cipher against passive attacks using fuzzy logic based approach;AIP Conference Proceedings;2024
2. High Security and Low Power AES Crypto Processor Security Algorithm for Image Encryption;2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS);2023-03-23
3. An Improved Key Management System - DES Ultimate v1.1;2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA);2023-03-14
4. Key Cryptographic Methods in the Cloud: A Comparative Study;2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT);2023-01-19
5. Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing;IEEE Access;2023