|
Abomhara, M., O.O. Khalifa, O. Zakaria, A.A. Zaidan, B.B. Zaidan and H.O. Alanazi, 2010. Suitability of using symmetric key to secure multimedia data: An overview. J. Applied Sci., 10: 1656-1661. CrossRef | Direct Link |
Al-Alak S., Z. Zukranian, A. Abdullah and S. Subramiam, 2012. Authentication time of IEEE 802.15.4 with multiple-key protocol using distributed message authentication code algorithm. Res. J. Inform. Technol., 4: 140-154. CrossRef | Direct Link |
Al-Alak, S., Z. Zukarnain, A. Abdullah and S. Subramiam, 2013. Randomness improvement of AES using MKP. Res. J. Inf. Technol., 5: 24-34. CrossRef | Direct Link |
Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367. CrossRef | Direct Link |
Janakiraman, S., K.V.S.K. Kumar, R.R.K. Reddy, A. Srinivasulu, R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2014. Humming bird with coloured wings: A feedback security approach. Inform. Technol. J., 13: 2022-2026. CrossRef | Direct Link |
Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72. CrossRef | Direct Link |
Rabah, K., 2006. Elliptic curve cryptography over binary finite field GF (2m). Inform. Technol. J., 5: 204-229. CrossRef | Direct Link |
Rabah, K., 2006. Implementing secure RSA cryptosystems using your own cryptographic JCE provider. J. Applied Sci., 6: 482-510. CrossRef | Direct Link |
Zaidan, A.A., B.B. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael. J. Applied Sci., 10: 2161-2167. CrossRef | Direct Link |
|
|
Citation to this article as recorded by
|
|
|
|