A study: cryptology techniques and methodologies
Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniq...
Saved in:
Main Authors: | Safitri, Cutifa, Shoukat Ali, Haroon, Ibrahim, Jamaludin |
---|---|
Format: | Article |
Language: | English |
Published: |
International Journal of Science and Research
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/38392/1/A_Study_Cryptology_Techniques_and_Methodologies.pdf http://irep.iium.edu.my/38392/ http://www.ijsr.net/archive/v2i12/MDIwMTM2NTM=.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005) -
The contribution of Ibn Ishaq al-Kindi to light, optics and cryptology
by: Saleem, Azizullah, et al.
Published: (2011) -
‘Malaysian Cryptology and Information Security Lecture Series’ dibuat dalam talian
by: Universiti Putra Malaysia, Pusat Strategi dan Perhubungan Korporat
Published: (2021) -
Wireless sensor networks: an overview from an optimization perspective
by: Shoukat Ali, Haroon, et al.
Published: (2014) -
BitTorrent: extra-locality P2P approach for grid content distribution networks
by: Mantoro, Teddy, et al.
Published: (2009)