Author:
Sadkhan Sattar B.,Abdulraheem Farqad H.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Proposed Security Evaluation of Post-Quantum Cryptography Based on Soft Computing;2023 Second International Conference on Advanced Computer Applications (ACA);2023-02-27
2. Fault Tolerance and Security Management in IoMT;Towards a Wireless Connected World: Achievements and New Technologies;2022
3. Construction of T-Vague Groups for Real-Valued Interference Channel;Advances in Intelligent Systems and Computing;2021-12-09
4. RSA cryptosystem with fuzzy set theory for encryption and decryption;AIP Conference Proceedings;2017