Applying Quran Security and Hamming CodesFor Preventing of Text Modification
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests...
Saved in:
| Main Author: | Baghdad Science Journal |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
University of Baghdad, College of Science for Women
2011-06-01
|
| Series: | مجلة بغداد للعلوم |
| Subjects: | |
| Online Access: | http://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/2815 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Increase Security of Li-Fi Technology by Using RSA Algorithm to Encryption and Decryption Important Data
by: Mohammed M. Ahmed, et al.
Published: (2024-12-01) -
Hardware implementation of RSA encryption algorithm based on pipeline
by: Yang Longfei, et al.
Published: (2024-01-01) -
Predicting Diabetes Mellitus with Machine Learning Techniques
by: Heba Ahmed Jassim, et al.
Published: (2025-06-01) -
Provably secure and efficient escrowable public key encryption schemes
by: Wen-hao LIU, et al.
Published: (2014-07-01) -
Block cipher mode research based on identifier of text files
by: Tong-ming ZHANG, et al.
Published: (2017-03-01)