New approach of cryptography algorithm for e- mail applications
Today security is the important thing that we need to transpose data from a location to another safely. As there is strong security, there is great hacker and spire at the other side. Therefore, many models and systems are looking for an ideal method to provide a secure environment for better optimi...
| Main Authors: | Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2005
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/38981/ http://psasir.upm.edu.my/id/eprint/38981/1/38981.pdf |
Similar Items
Spam e-mail: how Malaysian e-mail users deal with it?
by: Bujang, Yanti Rosmunie, et al.
Published: (2010)
by: Bujang, Yanti Rosmunie, et al.
Published: (2010)
Spam e-mail: how Malaysian e-mail users deal with it?
by: Bujang, Yanti Rosmunie, et al.
Published: (2010)
by: Bujang, Yanti Rosmunie, et al.
Published: (2010)
An e-voting application using cryptography technology
by: Chin, Hsin Tien
Published: (2020)
by: Chin, Hsin Tien
Published: (2020)
Modified Data Encryption Standard Algorithm for Textbased Applications
by: Mohamed Khmag, Asem Ib.
Published: (2006)
by: Mohamed Khmag, Asem Ib.
Published: (2006)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Quantum Chaotic Cryptography : A New Approach
by: Akhshani, Afshin
Published: (2015)
by: Akhshani, Afshin
Published: (2015)
A New Approach to Enhance E-mail Performance through POP3 Protocol
by: Al Bazar, Hussein, et al.
Published: (2008)
by: Al Bazar, Hussein, et al.
Published: (2008)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
Politeness in e-mails of Arab students in Malaysia
by: Zena Moayad Najeeb,, et al.
Published: (2012)
by: Zena Moayad Najeeb,, et al.
Published: (2012)
Features of e-mail discourse in an Iranian organization
by: Madanchian, Mitra
Published: (2012)
by: Madanchian, Mitra
Published: (2012)
Practical cryptography: algorithms and implementations using C++
Published: (2014)
Published: (2014)
RISC32-E cryptography performance evaluation
by: Teo, Sei Hau
Published: (2022)
by: Teo, Sei Hau
Published: (2022)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
E-mail alert via SMS / Mohd Fadhil Ab Rahman
by: Ab Rahman, Mohd Fadhil
Published: (2005)
by: Ab Rahman, Mohd Fadhil
Published: (2005)
Randomized text encryption: a new dimension in cryptography
by: Memon, Jamshed, et al.
Published: (2014)
by: Memon, Jamshed, et al.
Published: (2014)
Machine based cryptography
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
Persuasion strategies: use of negative forces in scam e-mails
by: Chitchanok Naksawat,, et al.
Published: (2016)
by: Chitchanok Naksawat,, et al.
Published: (2016)
Wap e-mail system (wapes) / Tan Wang Wee
by: Tan, Wang Wee
Published: (2003)
by: Tan, Wang Wee
Published: (2003)
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004)
by: Khalifa, Othman Omran, et al.
Published: (2004)
Quantum cryptography
by: Messikh, Azeddin
Published: (2011)
by: Messikh, Azeddin
Published: (2011)
Mail management system
by: Siti Nur Fathiah, Adnan
Published: (2015)
by: Siti Nur Fathiah, Adnan
Published: (2015)
Finite and infinite field cryptography analysis and applications
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2012)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2012)
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
by: Hilyati Hanina, Zazali
Published: (2012)
by: Hilyati Hanina, Zazali
Published: (2012)
A new lossless method of Huffman coding for text data compression and decompression process with FPGA implementation
by: Hameed, Maan, et al.
Published: (2016)
by: Hameed, Maan, et al.
Published: (2016)
Effectiveness of E-mail Support to Increase Physical Activity Within the Workplace
by: Woolmer, Jillian, et al.
Published: (2005)
by: Woolmer, Jillian, et al.
Published: (2005)
Can E-mail Support Increase Physical Activity Within the Workplace?
by: Woolmer, Jillian, et al.
Published: (2005)
by: Woolmer, Jillian, et al.
Published: (2005)
E-mail filter with attachment scanning prototype / Hema Losini Goval
by: Hema, Losini Goval
Published: (2001)
by: Hema, Losini Goval
Published: (2001)
An analysis of the use of e-mails for recreational purposes / Chan Ai Nyet.
by: Chan, Ai Nyet
Published: (2009)
by: Chan, Ai Nyet
Published: (2009)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Implementing cryptography in database
by: Kwan, Shong Hann
Published: (2010)
by: Kwan, Shong Hann
Published: (2010)
Deployment of new dynamic cryptography buffer for SCADA security enhancement
by: Aamir, Shahzad, et al.
Published: (2014)
by: Aamir, Shahzad, et al.
Published: (2014)
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
Presentation 2: An individualised approach – MoveM8! E-mail and SMS physical activity communication in the workplace
by: Suggs, L. Suzanne, et al.
Published: (2010)
by: Suggs, L. Suzanne, et al.
Published: (2010)
Scalar multiplication via elliptic nets with application to cryptography
by: Muslim, Norliana, et al.
Published: (2018)
by: Muslim, Norliana, et al.
Published: (2018)
A Knowledge-Based E-mail System Using Semantic Categorization and Rating Mechanisms.
by: Mohd Kassim, Azleena, et al.
Published: (2008)
by: Mohd Kassim, Azleena, et al.
Published: (2008)
Intelligent postal mails sorter
by: Omar, Mohd Arif Faiz, et al.
Published: (2011)
by: Omar, Mohd Arif Faiz, et al.
Published: (2011)
Similar Items
-
Spam e-mail: how Malaysian e-mail users deal with it?
by: Bujang, Yanti Rosmunie, et al.
Published: (2010) -
Spam e-mail: how Malaysian e-mail users deal with it?
by: Bujang, Yanti Rosmunie, et al.
Published: (2010) -
An e-voting application using cryptography technology
by: Chin, Hsin Tien
Published: (2020) -
Modified Data Encryption Standard Algorithm for Textbased Applications
by: Mohamed Khmag, Asem Ib.
Published: (2006) -
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)