From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing., , , и . UKSim, стр. 201-205. IEEE, (2015)Storage cost of spam 2.0 in a web discussion forum., , и . CEAS, стр. 200-209. ACM, (2011)Spam 2.0: The Problem Ahead., , , , , , и . ICCSA (2), том 6017 из Lecture Notes in Computer Science, стр. 400-411. Springer, (2010)Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT., , , , и . IEEE Access, (2020)Digital audio steganography: Systematic review, classification, and analysis of the current state of the art., , , , и . Comput. Sci. Rev., (2020)Systematic literature review: Trend analysis on the design of lightweight block cipher., , , , и . J. King Saud Univ. Comput. Inf. Sci., 35 (5): 101550 (мая 2023)Modifications of Key Schedule Algorithm on RECTANGLE Block Cipher., , , , и . ACeS, том 1347 из Communications in Computer and Information Science, стр. 194-206. Springer, (2020)Key Parameters in Identifying Cost of Spam 2.0., , , и . AINA, стр. 789-796. IEEE Computer Society, (2010)The Adaptive Multi-Level Phase Coding Method in Audio Steganography., , и . IEEE Access, (2019)Factors Involved in Estimating Cost of Email Spam., , и . ICCSA (2), том 6017 из Lecture Notes in Computer Science, стр. 383-399. Springer, (2010)