2010
DOI: 10.3923/jas.2010.2161.2167
|View full text |Cite
|
Sign up to set email alerts
|

Plagiarized: An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…encoding is the product of [A] and a constant [C(x)], The value of [C(x)] is the only determining factor between the two processes [30].…”
Section: Columnmentioning
confidence: 99%
“…encoding is the product of [A] and a constant [C(x)], The value of [C(x)] is the only determining factor between the two processes [30].…”
Section: Columnmentioning
confidence: 99%
“…Nevertheless, this method is risking the customer's credit card information and his fingerprint image by requesting it from the database and verifying them at the POS. It also needs to install the verification server on each brand store which increases the cost and decreases the reliability [10]. Another system was proposed to enhance the security of online purchasing using credit card by employing biometrics and steganography at the same time [11][12][13].…”
Section: Corporate Analysis Of Online Payment Techniquesmentioning
confidence: 99%
“…Nevertheless, this method is risking the customer's credit card information and his fingerprint image by requesting it from the database and verifying them at the POS. It also needs to install the verification server on each brand store which increase the cost and decrease the reliability (Zaidan et al, 2010a;Zaidan et al, 2010b). .…”
Section: Related Workmentioning
confidence: 99%