Found: 2 resources
Listing 1 - 2 of 2
Sort by
Hiding Encrypted Message using Image Algebra and McEliece Cryptosystem
Journal of Al-Ma'moon College, 2015, Volume , Issue 25, Pages 255-263
Autherizing Audio Remote Access using Encoded Hidden Data
Journal Of AL-Turath University College, 2022, Volume 2, Issue 33, Pages 144-156
Listing 1 - 2 of 2
Sort by