Article# | Article Title & Authors | Page |
15 |
D. Kandar, C. Subathradevi, S. Porkodi, C. Auxilium Princy, M. Nithya, and E. Bhuvaneswari
|
71 |
16 |
Nur Safwati Mohd Nor, Yoshio Maeda, and Makoto Mizukawa
|
75 |
17 |
The Design and Implementation of Encryption and Decryption Methods Based on Dynamic Conversion Table
Xiangzhen He, Xianghe Meng, Junsheng Xiao, and Fucheng Wan
|
79 |
18 |
Jiwon Oh, Yoonkab Noh, and Seibum B. Choi
|
82 |
19 |
Nan Lu, Yuanyuan Jin, and Lei Qin
|
88 |
20 |
Kazufumi Saito, Akira Yoshimura, and Joo-Ho Lee
|
94 |
21 |
Joaquim Ricardo Azevedo Teixeira and Maria João Viamonte
|
99 |
22 |
Takahiro Torii, Yusuke Yokota, and Eiji Okubo
|
105 |
23 |
Seifedine Kadry and Ali Kalakech
|
110 |
24 |
Ahmad Abboud, Ali Kalakech, Seifedine Kadry, and Ibrahim Sayed Ahmad
|
115 |
25 |
Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee, Chin-Wen Lee, Ping-Nan Chiu, and Cheng-Yi Wu
|
121 |
26 |
Diogo Teixeira and Artur Arsénio
|
125 |
27 |
Shrawan Kumar Trivedi and Shubhamoy Dey
|
132 |
28 |
Adnan Alrabea, A. V. Senthilkumar, Hasan Al-Shalabi, and Ahmad Bader
|
137 |
29 |
Asif Sohail Abid, Atif Sohail Abid, Muhammad Younus Javed, and Adnan Zahid
|
143 |
30 |
Chia-Mei Chen, Sheng-Tzong Cheng, and Ju-Hsien Chou
|
148 |
31 |
Tayyeba Minhas, Satish Anamalamudi, Xu Ning, and Minglu Jin
|
153 |