Author:
Qadir Abdalbasit Mohammed,Varol Nurhayat
Cited by
45 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Review of VLSI Architecture of Cryptography Algorithm for IOT Security;Proceedings of the 6th International Conference on Communications and Cyber Physical Engineering;2024
2. Hybrid Cryptography and Steganography with Rivest Shamir Adleman and End of File Algorithm;2023 Sixth International Conference on Vocational Education and Electrical Engineering (ICVEE);2023-10-14
3. Systems and Methods: Image Encryption Using Steganography and XOR Operations;2023 IEEE 5th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA);2023-10-07
4. Hybrid Encryption Based on Fernet and Rivest Shamir Adleman (RSA);2023 International Seminar on Application for Technology of Information and Communication (iSemantic);2023-09-16
5. An Evaluation of Number of Pixels Change Rate (NPCR) in Symetric Cryptography Based on Data Encryption Standard (DES);2023 International Seminar on Application for Technology of Information and Communication (iSemantic);2023-09-16