2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2013
DOI: 10.1109/ict4m.2013.6518904
|View full text |Cite
|
Sign up to set email alerts
|

Development of Al-Mu'awwidhah computing for personal data protection against abnormal attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…To ensure an unbreakable solution to the cryptographic techniques we should strengthen the key, encryption method and data representation. Some encryption schemes protect the sensitive and personal data with different security measures and techniques [4,5]. In different encryption scheme block cipher or product cipher technique used a block of the message in encrypt and decrypt by using s-box and p-box.…”
Section: Introductionmentioning
confidence: 99%
“…To ensure an unbreakable solution to the cryptographic techniques we should strengthen the key, encryption method and data representation. Some encryption schemes protect the sensitive and personal data with different security measures and techniques [4,5]. In different encryption scheme block cipher or product cipher technique used a block of the message in encrypt and decrypt by using s-box and p-box.…”
Section: Introductionmentioning
confidence: 99%