Search Results - "cryptography"

Refine Results
  1. 1

    Chaos Based Cryptography An Alternative to Algebraic Cryptography by Kamel Ariffin, Muhammad Rezal

    Published 2008
    “…We will discuss the earliest form of cryptography before fast forwarding to the current modem forms of cryptography. …”
    Get full text
    Get full text
  2. 2

    Communications cryptography by Khalifa, Othman Omran, Islam, Md. Rafiqul, Khan, Sheroz, Shebani, Mohammed S.

    Published 2004
    “…This paper focuses on the analysis of the two types of key cryptography exists, based on the availability of the key publicly: Private key Cryptography, and Public Key Cryptography. …”
    Get full text
    Get full text
  3. 3
  4. 4
  5. 5

    Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing by Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Anwar, Farhat, Pampori, Bisma Rasool

    Published 2017
    “…However, this paper proposes as integrated service of Advanced Quantum Cryptography with Cloud Computing. To ensure the secure Cloud Environment between sender and receiver, Quantum Cryptography proposes the use of photons and physics to generate cryptographic keys.…”
    Get full text
    Get full text
  6. 6

    Basics of security and cryptography by Pathan, Al-Sakib Khan

    Published 2014
    “…To begin with, the purpose of this book is not to delve into the history of cryptography or to analyze the debate on the first occurrence of the technique in communications technologies. …”
    Get full text
    Get full text
    Get full text
    Get full text
  7. 7
  8. 8
  9. 9

    Implementing cryptography in database by Kwan, Shong Hann

    Published 2010
    “…This system is developed using Java programming language with the use of Java Cryptography Extension for the cryptography process. …”
    Get full text
    Get full text
  10. 10
  11. 11
  12. 12

    Use of Cryptography in Cloud Computing by Jaber, Aws Naser, Mohamad Fadli, Zolkipli

    Published 2013
    “…Therefore, in this paper different cryptography aspects that pose a threat to cloud computing are reviewed. …”
    Get full text
    Get full text
  13. 13
  14. 14

    Number theoretical foundations in cryptography by Mohd Atan, Kamel Ariffin

    Published 2016
    “…In recent times the hazards in relationships among entities in different establishments worldwide have generated exciting developments in cryptography. Central to this is the theory of numbers. …”
    Get full text
    Get full text
  15. 15
  16. 16
  17. 17
  18. 18

    A survey on elliptic curve cryptography by Mohamed, Mohamad Afendee

    Published 2014
    “…Cryptography is an evolving field that research into discreet mathematical equation that is representable by computer algorithm for providing message condentiality. …”
    Get full text
    Get full text
  19. 19
  20. 20

    Practical cryptography: algorithms and implementations using C++

    Published 2014
    “…Many books are available on the subject of cryptography. Most of these books focus on only the theoretical aspects of cryptography. …”
    Get full text
    Get full text
    Get full text