咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 4 篇 计算机科学与技术...
    • 2 篇 网络空间安全
    • 1 篇 软件工程
  • 2 篇 医学
    • 2 篇 临床医学

主题

  • 3 篇 cryptography
  • 3 篇 encryption
  • 2 篇 cipher text
  • 2 篇 symmetric
  • 2 篇 cloud security
  • 2 篇 infection
  • 2 篇 decryption
  • 2 篇 matrix cipher
  • 1 篇 ciphertext
  • 1 篇 survival
  • 1 篇 symmetric algori...
  • 1 篇 mortality
  • 1 篇 clinical outcome
  • 1 篇 malware
  • 1 篇 encoding
  • 1 篇 asymmetric algor...
  • 1 篇 trauma
  • 1 篇 open fracture
  • 1 篇 data security
  • 1 篇 thromboembolic d...

机构

  • 3 篇 department of na...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of in...
  • 2 篇 department of co...
  • 1 篇 future technolog...
  • 1 篇 department of co...
  • 1 篇 institute of inf...
  • 1 篇 spine department...
  • 1 篇 john von neumann...
  • 1 篇 department of co...
  • 1 篇 department of tr...
  • 1 篇 department of co...
  • 1 篇 department of el...
  • 1 篇 institute of inf...
  • 1 篇 department of in...
  • 1 篇 trauma and ortho...
  • 1 篇 department of tr...

作者

  • 4 篇 saman riaz
  • 4 篇 muhammad nadeem
  • 4 篇 ali arshad
  • 4 篇 syeda wajiha zah...
  • 3 篇 sultan almotairi
  • 3 篇 ashit kumar dutt...
  • 2 篇 badr almutairi
  • 2 篇 wajiha zahra
  • 2 篇 zaid alzaid
  • 1 篇 mina seifo
  • 1 篇 rana alabdan
  • 1 篇 amir mosavi
  • 1 篇 paul cool
  • 1 篇 moteeb al moteri
  • 1 篇 ashwin bhadresha
  • 1 篇 syed aftab
  • 1 篇 muhammad abu bak...
  • 1 篇 david ford
  • 1 篇 tosan okoro
  • 1 篇 vinay jasani

语言

  • 6 篇 英文
检索条件"作者=syeda Wajiha zahra"
6 条 记 录,以下是1-10 订阅
排序:
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: syeda wajiha zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 2625-2640页
作者: Muhammad Nadeem Ali Arshad Saman Riaz syeda wajiha zahra Shahab SBand Amir Mosavi Department of Computer Science Abasyn UniversityIslamabad44000Pakistan Department of Computer Science National University of TechnologyIslamabad44000Pakistan Future Technology Research Center National Yunlin University of Science and TechnologyDouliuYunlin64002Taiwan Institute of Information Society University of Public ServiceBudapest1083Hungary John Von Neumann Faculty of Informatics Obuda UniversityBudapestHungary Institute of Information Engineering Automation and MathilticsSlovak University of Technology in BratislavaSlovakia
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 4059-4079页
作者: Muhammad Nadeem Ali Arshad Saman Riaz syeda wajiha zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi Department of Computing Abasyn UniversityIslamabadPakistan Department of Computer Science National University of TechnologyIslamabadPakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Kingdom of Saudi Arabia Department of Management Information Systems Business Administration CollegeKing Saud UniversityRiyadh11451Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure *** cryptography is a data encryption mechanism that consists of different steps and prevents the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 3065-3089页
作者: Ali Arshad Muhammad Nadeem Saman Riaz syeda wajiha zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi Department of Computer Science National University of TechnologyIslamabadPakistan Department of Computing Abasyn UniversityIslamabadPakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic university of MadinahMedinah42351Saudi Arabia Department of Information Systems Faculty of Computer and Information Sciences CollegeMajmaah University11952Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah 11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an *** cryptography is th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Safety of tranexamic acid in surgically treated isolated spine trauma
收藏 引用
World Journal of Orthopedics 2024年 第4期15卷 346-354页
作者: wajiha zahra Sandeep Krishan Nayar Ashwin Bhadresha Vinay Jasani Syed Aftab Trauma and Orthopedics Department University Hospital of North Midlands NHS TrustStoke-on-Trent ST46QGUnited Kingdom Trauma and Orthopedics Department Royal London HospitalBarts Health InstituteLondon E11BBUnited Kingdom Craniospinal Services University Hospital of North Midlands NHS TrustStokeon-Trent ST46QGUnited Kingdom Spine Department Royal London HospitalBarts Health InstituteLondon E11BBUnited Kingdom
BACKGROUND Tranexamic acid(TXA),a synthetic antifibrinolytic drug,effectively reduces blood loss by inhibiting plasmin-induced fibrin *** is the first study in the United Kingdom to investigate the effectiveness of TX... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Clinical outcome of open ankle fractures in patients above 70 years of age
收藏 引用
World Journal of Orthopedics 2023年 第7期14卷 554-561页
作者: wajiha zahra Mina Seifo Paul Cool David Ford Tosan Okoro Department of Trauma and Orthopedics Royal Shrewsbury HospitalShrewsbury SY38XQUnited Kingdom Department of Trauma and Orthopedics Robert Jones and Agnes Hunt Orthopaedic Hospital NHS Foundation TrustOswestry SY107AGUnited Kingdom Department of Trauma and Orthopedics Keele UniversityStafford ST55BGUnited Kingdom
BACKGROUND Open fractures of the ankle are complex injuries requiring multidisciplinary input and are associated with significant morbidity and ***,data on the clinical outcomes of open ankle fracture management in pa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论