Protection of text using SHA1 and Base64
Protection of information is a prerequisite demand in the world of computers today. Protection of information can be accomplished in different methods. The main objective of the use of the protection of information is to protect data and information in order to achieve privacy. This paper discusses...
Saved in:
Main Authors: | Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/24418/1/crypto-conf-langkawi.pdf http://irep.iium.edu.my/24418/ http://math.usm.my/cryptology2012/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Protection of the texts using Base64 and MD5
by: Taha, Imad, et al.
Published: (2012) -
Comparison and analysis study of sha-3 finallists
by: Taha, Imad, et al.
Published: (2012) -
Hash function of finalist SHA-3: analysis study
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013) -
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017) -
Protection mechanisms using MD5 and Base64
by: A. Ahmad, Mohammad, et al.
Published: (2011)