Applying Quran Security and Hamming CodesFor Preventing of Text Modification
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests...
Saved in:
| Main Author: | Baghdad Science Journal |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
University of Baghdad, College of Science for Women
2011-06-01
|
| Series: | مجلة بغداد للعلوم |
| Subjects: | |
| Online Access: | http://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/2815 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A cryptographic framework for secure medical imaging in smart healthcare environments
by: Kusum Lata, et al.
Published: (2025-09-01) -
RSA based encryption approach for preserving confidentiality of big data
by: Kanika Sharma, et al.
Published: (2022-05-01) -
RESEARCH OF PARAMETERS OF ENCODING OF THE ALGORITHM WITH VARIABLE FRAGMENTATION OF THE UNIT
by: K. O. Zakharova
Published: (2018-06-01) -
Fast computation of cyclic convolutions and their applications in code-based asymmetric encryption schemes
by: Andrey N. Sushko, et al.
Published: (2023-12-01) -
Information Encryption Algorithm Using a Discrete Quantum Map
by: A. V. Sidorenko, et al.
Published: (2025-07-01)