Search Results - "Saydah, Shaida Jumaah"

  • Showing 1 - 2 results of 2
Refine Results
  1. 1

    Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption by Muhammed, Rebwar Khalid, Aziz, Ribwar Rashid, Hassan, Alla Ahmad, Aladdin, Aso Mohammed, Saydah, Shaida Jumaah, Rashid, Tarik Ahmed, Hassan, Bryar Ahmad

    “…Nowadays, cybersecurity has grown into a more significant and difficult sci-entific issue. The recognition of threats and attacks meant for knowledge and…”
    Get full text
    Journal Article
  2. 2

    Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption by Muhammed, Rebwar Khalid, Aziz, Ribwar Rashid, Hassan, Alla Ahmad, Aladdin, Aso Mohammed, Saydah, Shaida Jumaah, Rashid, Tarik Ahmed, Hassan, Bryar Ahmad

    Published 26-07-2024
    “…Nowadays, cybersecurity has grown into a more significant and difficult scientific issue. The recog-nition of threats and attacks meant for knowledge and…”
    Get full text
    Journal Article