Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CVSS Based Approach Journal title: International Research Journal of Computer Science Authors: David Gitonga Mwathi, William Okelo-Odongo, Elisha Opiyo Subject(s):
Image Morphing with Data Security Journal title: International journal of Emerging Trends in Science and Technology Authors: Ankita Deshmukh Subject(s):
Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment Journal title: International journal of Emerging Trends in Science and Technology Authors: Dayananda RB Subject(s):
A New Digital Encryption Scheme: Sub areas Exchange Encryption Approach Journal title: International journal of Emerging Trends in Science and Technology Authors: N. Hanumantha Rao Subject(s):
INTEGRATING AND DECIPHERING SIGNAL BY FOURIER TRANSFORM Journal title: Academic Research International Authors: Lis Diana Mustafa Subject(s):
IMPLEMENTASI PENYEMBUNYIAN PESAN PADA CITRA DIGITAL DENGAN MENGGABUNGKAN ALGORITMA HILL CIPHER DAN METODE LEAST SIGNIFICANT BIT (LSB) Journal title: Jurnal Mantik Penusa Authors: Jane Irma Sari, Sulindawaty Sulindawaty, Hengki Tamando Sihotang Sihotang Subject(s):
QSCK: Quick Search using Searchable Chipertext Keywords for Cloud Storage Journal title: International journal of Emerging Trends in Science and Technology Authors: Vomshi P R Subject(s):
A Review on Enabling Synonym Based Fined-grained Multi-keyword Search Using Hierarchical Clustering Journal title: International journal of Emerging Trends in Science and Technology Authors: Miss. Pratima Prakash Pawar Subject(s):
Encoding and Decoding information with the help of Hill Cipher Journal title: International journal of Emerging Trends in Science and Technology Authors: Ashish Vashisht Subject(s):
A Low Cost FPGA based Cryptosystem Design for High Throughput Area Ratio Journal title: International Journal of Advanced Computer Science & Applications Authors: Muhammad Sohail Ibrahim, Irfan Ahmed, M. Imran Aslam, Muhammad Ghazaal, Kamran Raza, Shujaat Khan Subject(s):
The selection of forming polynomials for shift register with nonlinear feedback second order that generates the sequence with maximum period Journal title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА Authors: V. Potii, Nikolay Poluyanenko Subject(s):
KEY SCHEDULE OF BLOCK SYMMETRIC CIPHERS Journal title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА Authors: Alexandr Kuznetsov, Yuriy Gorbenko, Ievgeniia Kolovanova Subject(s):
Is there a perfect steganographic hiding of information exchange? Journal title: Телекомунікаційні та інформаційні технології Authors: Yurii Butsenko, Yulii Savchenko Subject(s):
Developing a New Hybrid Cipher Algorithm using DNA and RC4 Journal title: International Journal of Advanced Computer Science & Applications Authors: Rami k. Ahmed, Imad J. Mohammed Subject(s):
The algebraic immunity of nonlinear nodes symmetric ciphers Journal title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА Authors: Alexandr Kuznetsov, Yuriy Gorbenko, Ivan Belozertsev, Alina Andrushkevich, Aleksey Naregniy Subject(s):