Protection of the texts using Base64 and MD5
The encryption process combines mathematics and computer science. Cryptography consists of a set of algorithms and techniques to convert the data into another form so that the contents are unreadable and unexplainable to anyone who does not have the authority to read or write on these data. The main...
Main Authors: | Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi |
---|---|
Format: | Article |
Language: | English |
Published: |
Design for Scientific Renaissance
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/22164/ http://irep.iium.edu.my/22164/ http://irep.iium.edu.my/22164/1/212-1036-1-PB.pdf |
Similar Items
-
Protection of text using SHA1 and Base64
by: Taha, Imad, et al.
Published: (2012) -
Achieving security for images by LSB and MD5
by: Alahmad, Mohammad, et al.
Published: (2012) -
Protection mechanisms using MD5 and Base64
by: A. Ahmad, Mohammad, et al.
Published: (2011) -
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017) -
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)