Found about 7 results
Downloads: 195 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 9 Issue 1, January 2020
524 - 527A Review Paper on Network Security and Cryptography
Preeti Dewangan
Downloads: 134
Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013
352 - 357A Study: Cryptology Techniques and Methodologies
Cutifa Safitri [5] | Haroon Shoukat Ali [2] | Jamaludin Bin Ibrahim [4]
Downloads: 120 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
1289 - 1291Cryptography in Image Using Blowfish Algorithm
S. S. Sudha | S. Divya [6]
Downloads: 100
Research Paper, Mathematics, Tunisia, Volume 3 Issue 8, August 2014
1058 - 1060The Concept of Prime Number and its Application
Downloads: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Mathematics, Afghanistan, Volume 9 Issue 12, December 2020
1094 - 1095The Usage of Cyclic Group in the Clock
Miakhel Samimullah
Downloads: 8
Research Paper, Mathematics, Uganda, Volume 10 Issue 9, September 2021
1662 - 1692The Birch and Swinnerton-Dyer Conjecture
Downloads: 0
Research Proposals or Synopsis, Mathematics and Informatics, Bangladesh, Volume 11 Issue 6, June 2022
1370 - 1373