Downloads: 134
Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013
Pages: 352 - 357A Study: Cryptology Techniques and Methodologies
Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim
Share this article
International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed
ISSN: 2319-7064
Downloads: 134
Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013
Pages: 352 - 357Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim