Author:
Al-Sanjary Omar Ismael,Ahmed Ibrahim Omar,Sathasivem Kaswiini
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing Java Source Files Using the Cipher Cryptographic Algorithm;Biometrics and Cryptography;2024-06-19
2. A Comparative Analysis on Exploration of Stegosploits across Various Media Formats;2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS);2024-04-18
3. IOT-Based Encrypted for Knowledge Safeguarding;2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC);2023-12-19
4. Text embedding in image using an optimisation-based key generation method;International Journal of Intelligent Engineering Informatics;2023
5. Enhance E2E Online Shopping System Using Secure Fingerprint Parcel Delivering Method;Advances on Intelligent Computing and Data Science;2023