Coding, cryptography, information security and OFDM
| Other Authors: | Siddiqi, Muhammad Umar |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/14197/ http://irep.iium.edu.my/14197/1/Coding%2C_Cryptography%2C_.pdf |
Similar Items
Topics in coding, cryptography and information security
Published: (2011)
Published: (2011)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Musical Cryptography: Codes, Ciphers, Form, and Function
by: Thompson, Benjamin
Published: (2024)
by: Thompson, Benjamin
Published: (2024)
CCS528 – Information Security And
Cryptography
(Keselamatan Maklumat Dan
Kriptografi
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CCS528 – Information Security and Cryptography
(Keselamatan Maklumat dan Kriptografi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy
by: Al- Bakri, S.H., et al.
Published: (2011)
by: Al- Bakri, S.H., et al.
Published: (2011)
Quantum cryptography
by: Messikh, Azeddin
Published: (2011)
by: Messikh, Azeddin
Published: (2011)
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004)
by: Khalifa, Othman Omran, et al.
Published: (2004)
Machine based cryptography
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
Convolutional coded OFDM in broadband mobile communication
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
The performance of correlative coding in MIMO-OFDM systems
by: Syed-Yusof, Sharifah K., et al.
Published: (2005)
by: Syed-Yusof, Sharifah K., et al.
Published: (2005)
The performance of correlative coding in MIMO-OFDM systems
by: Syed Yusof, Sharifah Kamilah, et al.
Published: (2005)
by: Syed Yusof, Sharifah Kamilah, et al.
Published: (2005)
Performance improvement of pulsed OFDM UWB systems using ATF coding
by: El Sanhoury, Ahmed, et al.
Published: (2010)
by: El Sanhoury, Ahmed, et al.
Published: (2010)
CCS523 – COMPUTER SECURITY AND CRYPTOGRAPHY NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
CCS 523 - COMPUTER SECURITY AND CRYPTOGRAPHY NOV 2008
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CCS523- COMPUTER SECURITY AND CRYPTOGRAPHY JANUARI 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
Information security challenge of QR codes
by: Thompson, Nik, et al.
Published: (2013)
by: Thompson, Nik, et al.
Published: (2013)
Cryptography: past, present and future
Published: (2011)
Published: (2011)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Concatenated RS-convolutional codes for MIMO-OFDM system
by: Hussain, Ghasan Ali, et al.
Published: (2011)
by: Hussain, Ghasan Ali, et al.
Published: (2011)
Correlative coding with clipping and filtering technique in OFDM Systems
by: Yusof, S. K., et al.
Published: (2003)
by: Yusof, S. K., et al.
Published: (2003)
Performance of serially concatenated channel coding with space time block coding in OFDM transmission systems
by: Muladi, Muladi, et al.
Published: (2005)
by: Muladi, Muladi, et al.
Published: (2005)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Deployment of new dynamic cryptography buffer for SCADA security enhancement
by: Aamir, Shahzad, et al.
Published: (2014)
by: Aamir, Shahzad, et al.
Published: (2014)
Cryptanalysis, provable security and implementation of fuzzy identity-based cryptography
by: Tan, Syh Yuan
Published: (2014)
by: Tan, Syh Yuan
Published: (2014)
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
by: MOHAMMED AHMED JUBAIR, MOHAMMED AHMED JUBAIR, et al.
Published: (2022)
by: MOHAMMED AHMED JUBAIR, MOHAMMED AHMED JUBAIR, et al.
Published: (2022)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2023)
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2023)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
BER performance of OFDM system with the effect of error control code
by: Jamil, Muhammad Sobrun, et al.
Published: (2014)
by: Jamil, Muhammad Sobrun, et al.
Published: (2014)
PAR Reduction in Space-Time Coded OFDM via Modified Active Constellation Extension
by: Pradeep Kumara T. G., Amila, et al.
Published: (2008)
by: Pradeep Kumara T. G., Amila, et al.
Published: (2008)
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
by: Abomhara, Mohamed, et al.
Published: (2011)
by: Abomhara, Mohamed, et al.
Published: (2011)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahar, Nur Shahirah, et al.
Published: (2023)
by: Azahar, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Opticalb Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Securing OFDM-based systems from the physical layer
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Similar Items
-
Topics in coding, cryptography and information security
Published: (2011) -
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017) -
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014) -
Musical Cryptography: Codes, Ciphers, Form, and Function
by: Thompson, Benjamin
Published: (2024) -
CCS528 – Information Security And
Cryptography
(Keselamatan Maklumat Dan
Kriptografi
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)