Communications cryptography
In today's information age, communications play an important role which 1s contributed to the growth o f technologies. Electronic security is increasingly involved in making communications more prevalent. Therefore, a mechanism is needed to assure the security and...
| Main Authors: | Khalifa, Othman Omran, Islam, Md. Rafiqul, Khan, Sheroz, Shebani, Mohammed S. |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2004
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/5900/ http://irep.iium.edu.my/5900/1/01411111.pdf |
Similar Items
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Cyclic redundancy encoder for error detection in communication channels
by: Khalifa, Othman Omran, et al.
Published: (2004)
by: Khalifa, Othman Omran, et al.
Published: (2004)
A review on multimedia communications cryptography
by: Salem, Yasser, et al.
Published: (2011)
by: Salem, Yasser, et al.
Published: (2011)
Communication system for controlling smart appliances using power line communication
by: Khan, Sheroz, et al.
Published: (2006)
by: Khan, Sheroz, et al.
Published: (2006)
Quantum-Elliptic curve Cryptography for Multihop Communication in 5G Networks
by: Khan, A.S., et al.
Published: (2017)
by: Khan, A.S., et al.
Published: (2017)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Quantum cryptography
by: Messikh, Azeddin
Published: (2011)
by: Messikh, Azeddin
Published: (2011)
Towards an ethical online payment system through cryptography and next generation communication network
by: Hassan, Marwa Yousif, et al.
Published: (2017)
by: Hassan, Marwa Yousif, et al.
Published: (2017)
Wireless and wired remote measrement unit design and applications
by: Khan, Sheroz, et al.
Published: (2004)
by: Khan, Sheroz, et al.
Published: (2004)
Machine based cryptography
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
Real time lane detection for autonomous vehicles
by: Assidiq, Abdulhakam. AM., et al.
Published: (2008)
by: Assidiq, Abdulhakam. AM., et al.
Published: (2008)
High altitude platform for wireless communications and other services
by: Elshaikh, Zain Elabdin Omer, et al.
Published: (2006)
by: Elshaikh, Zain Elabdin Omer, et al.
Published: (2006)
Speech coding for Bluetooth with CVSD algorithm
by: Khalifa, Othman Omran, et al.
Published: (2004)
by: Khalifa, Othman Omran, et al.
Published: (2004)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Cryptography: past, present and future
Published: (2011)
Published: (2011)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
by: Abomhara, Mohamed, et al.
Published: (2011)
by: Abomhara, Mohamed, et al.
Published: (2011)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy
by: Al- Bakri, S.H., et al.
Published: (2011)
by: Al- Bakri, S.H., et al.
Published: (2011)
Coding, cryptography, information security and OFDM
Published: (2011)
Published: (2011)
Optical protection related in wavelength division multiplexing (WDM) technique
by: El Shebani, Mohamed, et al.
Published: (2014)
by: El Shebani, Mohamed, et al.
Published: (2014)
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
Malaysian vehicle license plate recognition
by: Khalifa, Othman Omran, et al.
Published: (2007)
by: Khalifa, Othman Omran, et al.
Published: (2007)
Wireless smoke detection system
by: Khalifa, Othman Omran, et al.
Published: (2008)
by: Khalifa, Othman Omran, et al.
Published: (2008)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahar, Nur Shahirah, et al.
Published: (2023)
by: Azahar, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Opticalb Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Data transfer over a low voltage power line for data acquisition and monitoring of electrical appliances
by: Khan, Sheroz, et al.
Published: (2006)
by: Khan, Sheroz, et al.
Published: (2006)
Wireless transfer of power to low power implanted biomedical devices: coil design considerations
by: Khan, Imran Moez, et al.
Published: (2012)
by: Khan, Imran Moez, et al.
Published: (2012)
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Implementing cryptography in database
by: Kwan, Shong Hann
Published: (2010)
by: Kwan, Shong Hann
Published: (2010)
A non-contact capacitance type level transducer for liquid characterization
by: Khan, Sheroz, et al.
Published: (2008)
by: Khan, Sheroz, et al.
Published: (2008)
Finite and infinite field cryptography analysis and applications
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2012)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2012)
Review of image processing in industrial inspection and quality control
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Rain fade and it's effect analysis for earth-to-satellite microwave link based on measured rainfall statistics in Bangladesh
by: Rashid, Mohammad Mahfujur, et al.
Published: (2009)
by: Rashid, Mohammad Mahfujur, et al.
Published: (2009)
Large Integer Arithmetic in GPU for Cryptography
by: Lee, Wen Dick
Published: (2017)
by: Lee, Wen Dick
Published: (2017)
Speaker recognition using mel frequency cepstrum
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Similar Items
-
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017) -
Cyclic redundancy encoder for error detection in communication channels
by: Khalifa, Othman Omran, et al.
Published: (2004) -
A review on multimedia communications cryptography
by: Salem, Yasser, et al.
Published: (2011) -
Communication system for controlling smart appliances using power line communication
by: Khan, Sheroz, et al.
Published: (2006) -
Quantum-Elliptic curve Cryptography for Multihop Communication in 5G Networks
by: Khan, A.S., et al.
Published: (2017)