Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Concealment of information is the most important things of interest to scientists and users alike. The work of many researchers to find new ways and methods for building specialized systems to protect the information from hackers. The method of those techniques AES and an adopted by the U.S. Depart...
Saved in:
Main Author: | Shuwandy, Moceheb Lazam |
---|---|
Format: | Thesis |
Language: | English English |
Published: |
2012
|
Subjects: | |
Online Access: | http://etd.uum.edu.my/2946/1/Moceheb_Lazam_Shuwandy.pdf http://etd.uum.edu.my/2946/4/Moceheb_Lazam_Shuwandy.pdf http://etd.uum.edu.my/2946/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019) -
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004) -
Design and evaluation of new sensors-based smartphone authentication techniques
by: Alrufaye, Moceheb Lazam Shuwandy
Published: (2019) -
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020) -
Visual Cryptography for E-Voting by Using Fingerprint Technique
by: Ghayab, Hadi Ratham
Published: (2010)