A study: cryptology techniques and methodologies
Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts to define the existing cryptology techniq...
| Main Authors: | Safitri, Cutifa, Shoukat Ali, Haroon, Ibrahim, Jamaludin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
International Journal of Science and Research
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/38392/ http://irep.iium.edu.my/38392/1/A_Study_Cryptology_Techniques_and_Methodologies.pdf |
Similar Items
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
The contribution of Ibn Ishaq al-Kindi to light, optics and cryptology
by: Saleem, Azizullah, et al.
Published: (2011)
by: Saleem, Azizullah, et al.
Published: (2011)
Wireless sensor networks: an overview from an optimization perspective
by: Shoukat Ali, Haroon, et al.
Published: (2014)
by: Shoukat Ali, Haroon, et al.
Published: (2014)
‘Malaysian Cryptology and Information Security Lecture Series’ dibuat dalam talian
by: Universiti Putra Malaysia, Pusat Strategi dan Perhubungan Korporat
Published: (2021)
by: Universiti Putra Malaysia, Pusat Strategi dan Perhubungan Korporat
Published: (2021)
Proceedings of the 9th International Cryptology and Information Security Conference 2024
by: Institute for Mathematical Research
Published: (2024)
by: Institute for Mathematical Research
Published: (2024)
Proceedings of the 7th International Cryptology and Information Security Conference 2020
by: Institute for Mathematical Research
Published: (2020)
by: Institute for Mathematical Research
Published: (2020)
Proceedings of the 6th International Cryptology and Information Security Conference 2018
by: Institute for Mathematical Research
Published: (2018)
by: Institute for Mathematical Research
Published: (2018)
Proceedings of the 5th International Cryptology and Information Security Conference 2016
by: Institute for Mathematical Research
Published: (2016)
by: Institute for Mathematical Research
Published: (2016)
Proceedings of the 4th International Cryptology and Information Security Conference 2014
by: Institute for Mathematical Research
Published: (2014)
by: Institute for Mathematical Research
Published: (2014)
BitTorrent: extra-locality P2P approach for grid content distribution networks
by: Mantoro, Teddy, et al.
Published: (2009)
by: Mantoro, Teddy, et al.
Published: (2009)
Success factors and change management in Malaysian Institutions of Higher Learning (IHL)
by: Safitri, Cutifa, et al.
Published: (2013)
by: Safitri, Cutifa, et al.
Published: (2013)
Value-driven approach for project success and change management in Malaysian Institutions of Higher Learning (IHL)
by: Faisal, Ammy Amelia, et al.
Published: (2013)
by: Faisal, Ammy Amelia, et al.
Published: (2013)
Energy efficiency mechanisms using mobile node in wireless sensor networks
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Digital watermarking techniques and methodologies
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Power reconfigurations and enterprise development: Elite contestations and business groups in Pakistan / Ayesha Shoukat
by: Ayesha, Shoukat
Published: (2016)
by: Ayesha, Shoukat
Published: (2016)
Enhancing a Fuzzy Failure Mode and Effect Analysis methodology with an Analogical Reasoning Technique
by: Tze, Ling Jee, et al.
Published: (2011)
by: Tze, Ling Jee, et al.
Published: (2011)
Methodology (Technology)
by: Diyana, Kamarudin
Published: (2017)
by: Diyana, Kamarudin
Published: (2017)
Methodology (Engineering)
by: Rohaida, Che Man
Published: (2017)
by: Rohaida, Che Man
Published: (2017)
Research methodologies: a practical approach
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Human posture recognition: methodology and implementation
by: Htike, Kyaw Kyaw, et al.
Published: (2015)
by: Htike, Kyaw Kyaw, et al.
Published: (2015)
A preliminary study on new cooling techniques for stingless bees hive
by: Luqman, Abdul Halim, et al.
Published: (2020)
by: Luqman, Abdul Halim, et al.
Published: (2020)
Impact of Telecentres in Malaysia - Conceptual and Methodological Issues
by: Hazis, F.S.
Published: (2011)
by: Hazis, F.S.
Published: (2011)
Methodology of hadith comprehension: interpretation techniques in Fiqh al-Hadith
by: Ahmad, Arifuddin
Published: (2016)
by: Ahmad, Arifuddin
Published: (2016)
Arabic text summarization using pre-processing methodologies and techniques
by: Abdelwahab, Mohamed Yassin, et al.
Published: (2023)
by: Abdelwahab, Mohamed Yassin, et al.
Published: (2023)
A Methodology for Wind Energy Evaluation in Complex
Terrain Regions of Sarawak
by: Wan Zainal Abidin, W.A
Published: (2015)
by: Wan Zainal Abidin, W.A
Published: (2015)
Functional characterization of a novel synthetic herbicide resistance gene in a model plant
by: Sarwat,, et al.
Published: (2023)
by: Sarwat,, et al.
Published: (2023)
Using biometric techniques to secure online student assessment: Comparative study
by: Ibrahim, Jamaludin, et al.
Published: (2011)
by: Ibrahim, Jamaludin, et al.
Published: (2011)
Prince2 Methodology: An Innovative Way for Improving Performance of Malaysian Automotive Industry
by: Saima, Said, et al.
Published: (2013)
by: Saima, Said, et al.
Published: (2013)
Co-gasification between coal/sawdust and coal/wood pellet: A parametric study using response surface methodology
by: Fatin Zafirah, Mansur, et al.
Published: (2020)
by: Fatin Zafirah, Mansur, et al.
Published: (2020)
Accelerated new factory certification using CE methodology
by: Mohiuddin, A. K. M., et al.
Published: (2004)
by: Mohiuddin, A. K. M., et al.
Published: (2004)
Agent oriented methodology for malaria transmission modelling and simulation
by: Loh, Chee Wyai, et al.
Published: (2017)
by: Loh, Chee Wyai, et al.
Published: (2017)
Methodology development for designing energy efficient distillation column systems
by: Mohd Faris, Mustafa, et al.
Published: (2014)
by: Mohd Faris, Mustafa, et al.
Published: (2014)
Potential use of data mining techniques in information technology consulting operations
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Research methodology as core curriculum for general studies
by: Ahmad Zamri Mansor,, et al.
Published: (2010)
by: Ahmad Zamri Mansor,, et al.
Published: (2010)
RPK 533 – Methodology And Technique Of Research
- December 2013 / January 2014
by: PPPBP, Pusat Pengajian Perumahan Bangunan Dan Perancangan
Published: (2013)
by: PPPBP, Pusat Pengajian Perumahan Bangunan Dan Perancangan
Published: (2013)
Optimisation of Solid Liquid Extraction of Orthosiphon stamineus Leaves using Response Surface Methodology Technique
by: A. R., Mohd Farhan, et al.
Published: (2015)
by: A. R., Mohd Farhan, et al.
Published: (2015)
Optimization of Rebaudioside A extraction from stevia leaves using response surface methodology
by: Kalaiarasan, Muthusamy, et al.
Published: (2020)
by: Kalaiarasan, Muthusamy, et al.
Published: (2020)
Different Techniques for Simultaneously Increasing the Penetration Level of Rooftop PVs in Residential LV Networks and Improving Voltage Profile
by: Safitri, N., et al.
Published: (2014)
by: Safitri, N., et al.
Published: (2014)
Characteristics and characterization methodologies of msw at source - a review
by: Goh,, Chun Teck
Published: (2009)
by: Goh,, Chun Teck
Published: (2009)
Characteristics And Characterization Methodologies Of MSW At Source - A Review
by: Goh, C.T
Published: (2009)
by: Goh, C.T
Published: (2009)
Similar Items
-
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005) -
The contribution of Ibn Ishaq al-Kindi to light, optics and cryptology
by: Saleem, Azizullah, et al.
Published: (2011) -
Wireless sensor networks: an overview from an optimization perspective
by: Shoukat Ali, Haroon, et al.
Published: (2014) -
‘Malaysian Cryptology and Information Security Lecture Series’ dibuat dalam talian
by: Universiti Putra Malaysia, Pusat Strategi dan Perhubungan Korporat
Published: (2021) -
Proceedings of the 9th International Cryptology and Information Security Conference 2024
by: Institute for Mathematical Research
Published: (2024)