[1]
|
Artificial Intelligence of Things
Communications in Computer and Information Science,
2024
DOI:10.1007/978-3-031-48774-3_10
|
|
|
[2]
|
Improved Encryption Algorithm for Public Wireless Network
Journal of Advances in Information Technology,
2024
DOI:10.12720/jait.15.2.233-244
|
|
|
[3]
|
Cloud Cryptography: A Cutting-Edge Method to Protect Your Cloud
2023 6th International Conference on Contemporary Computing and Informatics (IC3I),
2023
DOI:10.1109/IC3I59117.2023.10397990
|
|
|
[4]
|
Triple Encryption of Images based on RC4, Zigzag, and Elliptic Curve Algorithms for Enhanced Security
International Journal of Scientific Research in Science, Engineering and Technology,
2023
DOI:10.32628/IJSRSET231023
|
|
|
[5]
|
Comparing 5G Network Latency Utilizing Native Security Algorithms
2023 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit),
2023
DOI:10.1109/EuCNC/6GSummit58263.2023.10188309
|
|
|
[6]
|
A Modern mechanism for Generating 3DES Algorithm Keys Based on Rubik's Cube
International Journal of Scientific Research in Science, Engineering and Technology,
2022
DOI:10.32628/IJSRSET22966
|
|
|
[7]
|
Analysis of SQL Injection Attack Detection and Prevention on MySQL Database Using Input Categorization and Input Verifier
2022 IEEE 8th Information Technology International Seminar (ITIS),
2022
DOI:10.1109/ITIS57155.2022.10010201
|
|
|
[8]
|
Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds
Computers, Materials & Continua,
2022
DOI:10.32604/cmc.2022.028272
|
|
|
[9]
|
Analysis of SQL Injection Attack Detection and Prevention on MySQL Database Using Input Categorization and Input Verifier
2022 IEEE 8th Information Technology International Seminar (ITIS),
2022
DOI:10.1109/ITIS57155.2022.10010201
|
|
|
[10]
|
Using AES and DES Cryptography for System Development File Submission Security Mobile-Based
2020 8th International Conference on Cyber and IT Service Management (CITSM),
2020
DOI:10.1109/CITSM50537.2020.9268805
|
|
|