A Novel Approach for Cryptography using Modified Substitution Cipher and Triangulation Journal title: International Research Journal of Computer Science Authors: Sainik Kumar Mahata, Monalisa Dey Subject(s):
ARABIC Cryptography Technique Using Neural Network and Genetic Algorithm Journal title: International Research Journal of Computer Science Authors: Shaza D. Rihan, Dr.Saif Eldin F .Osma Subject(s):
COMPARATIVE ANALYSIS OF HIGHER GENUS HYPERELLIPTIC CURVE CRYPTOSYSTEMS OVER FINITE FIELD FP Journal title: ICTACT Journal on Communication Technology Authors: Ganesan R, Vivekanandan K Subject(s):
SURVEY ON DESIGN OF PATIENT BLOOD PRESSURE MONITORING SYSTEM USING SECURE IOT Journal title: International journal of research -GRANTHAALAYAH Authors: Subject(s):
Study of RSA Algorithm: Integer Factoriz ation Approach for secure Data Transmission Journal title: International Journal of Scientific Research and Management Authors: Nilesh K. Kajale Subject(s):
Authentication Revolution using Bring Your Own Identity Journal title: International Journal of Scientific Research and Management Authors: Supriya N. Kolambkar Subject(s):
PostGRE Database Server and Overview on its Various Encryption Methods Journal title: GRD Journal for Engineering Authors: Anshul Bansal, Durva Deshmukh, Shreyans Kering, V. P Vimal Dev, Shraddha R. Khonde Subject(s):
ANALYSIS AND DEVELOPMENT OF METHODS DEOBFUSKATSIYI SCRIPTS TO IDENTIFY THREATS TO INFORMATION COMPUTER SUSTAINABILITY Journal title: Международный научный журнал "Интернаука" Authors: Volodymyr Unhul Subject(s):
Data Confidentiality and Security in Cloud Computing Using KIST Algorithm Journal title: International journal of Emerging Trends in Science and Technology Authors: Adesh V. Bhabad Subject(s):
Encoding and Decoding information with the help of Hill Cipher Journal title: International journal of Emerging Trends in Science and Technology Authors: Ashish Vashisht Subject(s):
REVIEWING AND APPLYING SECURITY SERVICES WITH NON-ENGLISH LETTER CODING TO SECURE SOFTWARE APPLICATIONS IN LIGHT OF SOFTWARE TRADE-OFFS Journal title: International Journal of Software Engineering and Computer Systems Authors: Kamel Hussein Rahouma Subject(s):
Ensuring Data Provenance with Package Watermarking Journal title: International Journal of Advanced Computer Science & Applications Authors: Muhammad Umer Sarwar, Muhammad Kashif Hanif, Ramzan Talib, Muhammad Asad Abbas Subject(s):
Cryptography: A Comparative Analysis for Modern Techniques Journal title: International Journal of Advanced Computer Science & Applications Authors: Faiqa Maqsood, Muhammad Ahmed, Muhammad Mumtaz Ali, Munam Ali Shah Subject(s):
IMPLEMENTING NTRU-similar ALGORITHM ON THE BASIS OF NTRUPrime Journal title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА Authors: Ivan Gorbenko, Оlena Kachko, Gleb Naumenko Subject(s):
Cryptography and Steganography: New Approach Journal title: Transactions on Networks and Communications Authors: Ahmed AL-Shaaby, Talal AlKharobi Subject(s):