11 results for cryptography.

Parameters for your search query:
Keyword    cryptography

Open AccessArticle
Export: RIS | BibTeX | EndNote
Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey
Information Security and Computer Fraud. 2015, 3(1), 1-7. DOI: 10.12691/iscf-3-1-1
Pub. Date: June 23, 2015Views: 25311Downloads: 20824
Open AccessArticle
Export: RIS | BibTeX | EndNote
DecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds
Journal of Computer Sciences and Applications. 2015, 3(3), 73-78. DOI: 10.12691/jcsa-3-3-3
Pub. Date: June 10, 2015Views: 7282Downloads: 5459Citations: 6
Open AccessArticle
Export: RIS | BibTeX | EndNote
Multilevel Network Security Combining Cryptography and Steganography on ARM Platform
Journal of Embedded Systems. 2015, 3(1), 11-15. DOI: 10.12691/jes-3-1-2
Pub. Date: March 22, 2015Views: 12983Downloads: 10677
Open AccessArticle
Export: RIS | BibTeX | EndNote
Science of Cryptogrraphy
International Transaction of Electrical and Computer Engineers System. 2014, 2(2), 61-66. DOI: 10.12691/iteces-2-2-3
Pub. Date: March 19, 2014Views: 9625Downloads: 5204Citations: 2
Open AccessArticle
Export: RIS | BibTeX | EndNote
The State of Wireless Routers as Gateways for Internet of Things (IoT) Devices
Information Security and Computer Fraud. 2018, 6(1), 8-18. DOI: 10.12691/iscf-6-1-2
Pub. Date: December 24, 2018Views: 4251Downloads: 3858
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
A Survey on Cryptography Key Management Schemes for Smart Grid
Journal of Computer Sciences and Applications. 2015, 3(3A), 27-39. DOI: 10.12691/jcsa-3-3A-4
Pub. Date: July 23, 2015Views: 10074Downloads: 6767Citations: 2
This article belongs to the Special Issue Big Data Analytics in Intelligent Systems
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Cryptanalysis Using Soft Computing Techniques
Journal of Computer Sciences and Applications. 2015, 3(2), 52-55. DOI: 10.12691/jcsa-3-2-6
Pub. Date: April 23, 2015Views: 7096Downloads: 5131Citations: 1
This article belongs to the Special Issue Applicability of Soft Computing in NP Hard Problems
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Selection of Fittest Key Using Genetic Algorithm and Autocorrelation in Cryptography
Journal of Computer Sciences and Applications. 2015, 3(2), 46-51. DOI: 10.12691/jcsa-3-2-5
Pub. Date: April 23, 2015Views: 13417Downloads: 10624
This article belongs to the Special Issue Applicability of Soft Computing in NP Hard Problems
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Cryptography during Data Sharing and Accessing Over Cloud
International Transaction of Electrical and Computer Engineers System. 2015, 3(1), 12-18. DOI: 10.12691/iteces-3-1-2
Pub. Date: March 24, 2015Views: 8984Downloads: 6163Citations: 9
This article belongs to the Special Issue Special issue on Cryptography & Network Security
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Review on Network Security and Cryptography
International Transaction of Electrical and Computer Engineers System. 2015, 3(1), 1-11. DOI: 10.12691/iteces-3-1-1
Pub. Date: March 24, 2015Views: 36383Downloads: 17360Citations: 13
This article belongs to the Special Issue Special issue on Cryptography & Network Security
Results: sort by Relevance

Filter by

Date

Published between:

and

Subjects


Journals





Article Types