To search, Click below search items.
All Published Papers Search Service
Title
Concealed Policy and Ciphertext Cryptography of Attributes with Keyword Searching for Searching and Filtering Encrypted Cloud Email
Author
Hind Alhumaidi and Hatim Alsuwat
Vol. 22 No. 6 pp. 212-222
Keywords
Attribute accompanied by Keyword-based Searching, system of dual cryptography, filtering-based encrypted email, Policy of concealed.
Using Machine Learning to Improve Evolutionary Multi-Objective Optimization
Rakan Alotaibi
Vol. 22 No. 6 pp. 203-211
Multi-objective, MOPs, MOEA, ML, Evolutionary Algorithm.
Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network
Hanouf Aloufi1 and Hatim Alsuwat
Vol. 22 No. 6 pp. 194-202
Public Network, Wi-Fi, Security, Man in the middle attack, Cryptography, Survey.
The Teacher¡¯s Role in the Context of Information Society
Natalia Dmitrenko, Oksana Voloshyna, Liudmyla Melnyk, Valentyna Hrebenova, Inna Mazur
Vol. 22 No. 6 pp. 187-193
transformation of the teacher¡¯s role, teacher¡¯s competencies, modification of the educational process, training of prospective teachers