To search, Click below search items.
All Published Papers Search Service
Title
Switching between the AES-128 and AES-256 Using Ks * & Two Keys
Author
Moceheb Lazam Shuwandy, Ali Khalil Salih, Firas layth Khaleel, Adib M.Monzer Habbal
Vol. 10 No. 8 pp. 136-140
Keywords
Switching, Ks, SDA, K1, K2
An Efficient Protocol for eAuction
Jan Seruga, Brian Curtis, Josef Pieprzyk
Vol. 10 No. 8 pp. 131-135
eAuction, multiparty security, protocol, trusted-third-party
Efficient Scalable Multi-Level Classification Scheme for Credit Card Fraud Detection
Dipti D.Patil, Sunita M.Karad, Vijay M.Wadhai, J A Gokhale, Prasad S.Halgaonkar
Vol. 10 No. 8 pp. 123-130
Distributed data Mining, Decision Tree, Pruning, Intrusion Detection
Information Retrieval of Text with Diacritics
Khalid Saleh Rabeh Aloufi
Vol. 10 No. 8 pp. 118-122
Information Retrievals, Natural Language Processing, Regular Expressions, Search Engines