Open Access
ARTICLE
Awny Sayed1,2, Maha Mahrous3, Enas Elgeldawi1,*
1 Computer Science Department, Faculty of Science, Minia University, Minia, 61519, Egypt
2 Faculty of Computing and Information Technology, Information Technology Department, King Abdulaziz University, Jeddah, 21589, Saudi Arabia
3 Computer Science Department, Faculty of Computers and Information, Minia University, Minia, 61519, Egypt
* Corresponding Author: Enas Elgeldawi. Email:
Computers, Materials & Continua 2023, 74(1), 1723-1734. https://doi.org/10.32604/cmc.2023.032838
Received 31 May 2022; Accepted 04 July 2022; Issue published 22 September 2022
View
Download
Like
A Highly Effective DPA Attack Method Based on Genetic Algorithm
Shuaiwei Zhang, Xiaoyuan Yang,...Reliable Medical Recommendation Based on Privacy-Preserving Collaborative Filtering
Mengwei Hou, Rong Wei, Tiangang...Watermark Embedding for Direct Binary Searched Halftone Images by Adopting Visual Cryptography
Yangyang Wang, Rongrong Ni, Yao...Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications
V. Gopinath, R. S. BhuvaneswaranOptimal Adaptive Genetic Algorithm Based Hybrid Signcryption Algorithm for Information Security
R. Sujatha, M. Ramakrishnan, N....