Found: 7 resources


Narrow your search

Resource type

article (7)


Language

English (5)


Year
From To Submit

2017 (1)

2016 (1)

2015 (1)

2014 (1)

2012 (2)

More...
Listing 1 - 7 of 7
Sort by

Proposal for Complex AES Security using key Generator and Text Permutation

Engineering and Technology Journal, 2012, Volume 30, Issue 12, pages 2067-2075
 

Proposal New Approach for Blowfish Algorithm by Using Random Key Generator

JOURNAL OF MADENAT ALELEM COLLEGE, 2012, Volume 4, Issue 1, pages 5-13
 

Secret Message Hiding in WAVE PCM Sound File

JOURNAL OF MADENAT ALELEM COLLEGE, 2015, Volume 7, Issue 2, pages 5-16
 

Enhancing the Security of Playfair Cipher by Stream Cipher

Journal of Al-Qadisiyah for Computer Science and Mathematics, 2014, Volume 6, Issue 2, pages 169-175
 

USEs OF GA, PSO and MPSO TO BREAK TRANSPOSITION CIPHER SYSTEM: comparative study

Journal of College of Education, 2016, Volume , Issue 5, pages 207-226
 
 

volume 32 year 1998

Iraqi Journal for Computers and Informatics, 1998, Volume 32, Issue 1, pages 1-55
 

Listing 1 - 7 of 7
Sort by