[HTML][HTML] SIKM–a smart cryptographic key management framework

SS Chaeikar, A Ahmadi, S Karamizadeh… - Open Computer …, 2022 - degruyter.com
For a secure data transmission in symmetric cryptography, data are encrypted and
decrypted using an identical key. The process of creating, distributing, storing, deploying …

Exploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana

BS Afriyie - 2022 - search.proquest.com
Nearly half the adult population in developing nations lacks a formal bank account and other
financial services. Ghana is no exception, having a massive community of unbanked adults …

Impact of Social Media Application Qualities on Using Them for Daily News

D Farhadi, A Maroosi - Acta Informatica Pragensia, 2022 - ceeol.com
A model is introduced to investigate the effect of social media application qualities on the
using of these applications for daily news. A standard questionnaire was designed and …

[PDF][PDF] SMS Security by Elliptic Curve and Chaotic Encryption Algorithms

ZW Salman, HI Mohammed, AM Enad - Al-Mustansiriyah Journal of Science, 2023 - iasj.net
Short message services (SMS) represent one of the components of the global
communications network and are one of the important developments in communication …

[PDF][PDF] Anonymous Financial Transactions in Hidden Illegal Trades

MA Younes Taher, A Khatri, A Mansour - researchgate.net
This study examines the methodologies and findings of recent studies on the usage patterns
of Bitcoin addresses that were gathered over the span of 18 months beginning in June 2020 …

[PDF][PDF] Face recognition by deep learning Algorithems

Y Taher, A Yousef, Y Ahmad, A Khatri - researchgate.net
one of the commen face recognition methods utlized in identification and securirty. one of
the proplem in face recognitiom can be errors in featuer detecion due to illumination or opse …

[PDF][PDF] IOT and Machin Learning

A Khatri, A Peter - researchgate.net
Communication is the process of sending and receiving messages through signs or
language or behavior or any other means. Currently, person-to-person communication is …

[引用][C] An in-depth analysis of the major cryptocurrency security attacks

M Sadeghi