咨询与建议

限定检索结果

文献类型

  • 1 篇 期刊文献

馆藏范围

  • 1 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 工学
    • 1 篇 计算机科学与技术...

主题

  • 1 篇 cipher text
  • 1 篇 symmetric
  • 1 篇 encoding
  • 1 篇 cryptography
  • 1 篇 hill matrix
  • 1 篇 decoding
  • 1 篇 encryption
  • 1 篇 64-bit encryptio...
  • 1 篇 matrix cipher

机构

  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of na...
  • 1 篇 department of in...
  • 1 篇 department of in...
  • 1 篇 department of co...

作者

  • 1 篇 rana alabdan
  • 1 篇 saman riaz
  • 1 篇 muhammad nadeem
  • 1 篇 badr almutairi
  • 1 篇 sultan almotairi
  • 1 篇 ali arshad
  • 1 篇 ashit kumar dutt...
  • 1 篇 syeda wajiha zah...
  • 1 篇 zaid alzaid

语言

  • 1 篇 英文
检索条件"主题词=64-bit encryption"
1 条 记 录,以下是1-10 订阅
排序:
Hill Matrix and Radix-64 bit Algorithm to Preserve Data Confidentiality
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 3065-3089页
作者: Ali Arshad Muhammad Nadeem Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi Department of Computer Science National University of TechnologyIslamabadPakistan Department of Computing Abasyn UniversityIslamabadPakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic university of MadinahMedinah42351Saudi Arabia Department of Information Systems Faculty of Computer and Information Sciences CollegeMajmaah University11952Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah 11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptog... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论