To search, Click below search items.
All Published Papers Search Service
Title
Efficient Utilization of Cryptographic Resources in Embedded Computing Systems
Author
Muhammad Nabeel Asim, Muhammad Salman Khalid, Muhammad Idrees, Abdur Rehman
Vol. 17 No. 10 pp. 81-88
Keywords
Cryptographic, embedded, computing system
Selfie Authentication: Using Handheld Devices Through Iris Recognition
Bandar Al-Ghamdi, Majed Al-Anizy, Omar Sultan, Fahad Al-harby
Vol. 17 No. 10 pp. 67-80
Authentication, Selfie, handheld device, iris
Structural Means Generating Pseudorandom Sequences Of Fixed Weight Binary Patterns
Rabah AlShboul and Vitaliy A. Romankevich
Vol. 17 No. 10 pp. 62-66
Pseudorandom sequences, fixed weight, binary patterns, statistical modeling of the behavior, pseudorandom generator.
A Survey on security of Cloud-based Data Center Infrastructures
Majid Asadpoor
Vol. 17 No. 10 pp. 57-61
Cloud computing, Cloud security, security vulnerabilities, Security Issues, Cloud Architecture, Data Protection and Cloud Platform.