Protection of the digital holy Quran using SAB hash function

Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. One of the tools used by cryptography is the hash function. The hash funct...

Full description

Saved in:
Bibliographic Details
Main Authors: Alshaikhli, Imad Fakhri Taha, Alahmad, Mohammad
Format: Conference or Workshop Item
Language:English
English
English
Published: 2013
Subjects:
Online Access:http://irep.iium.edu.my/30607/2/Table_of_Content.pdf
http://irep.iium.edu.my/30607/3/53.pdf
http://irep.iium.edu.my/30607/4/certificate_%28Dr__Imad_Fakhri%292013.pdf
http://irep.iium.edu.my/30607/
http://dsr-conferences.co.uk/iman/
Tags: Add Tag
No Tags, Be the first to tag this record!