Author:
Ubaidullah Mohammad,Makki Qahtan
Publisher
Foundation of Computer Science
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secured Data Storage Using OAuth and Encryption of Data Using AES with Patterns and Hidden Layer;2024 International Conference on Smart Systems for Electrical, Electronics, Communication and Computer Engineering (ICSSEECC);2024-06-28
2. Securing AI Systems: A Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity;2024 13th Mediterranean Conference on Embedded Computing (MECO);2024-06-11
3. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis;International Journal of Information Security;2024-05-05
4. A Double Layer Encryption for Communication using Cryptographic Algorithms;2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE);2024-02-22
5. A Survey to Lightweight Cryptography World;2024 International Conference on Green Energy, Computing and Sustainable Technology (GECOST);2024-01-17