Smile Mask to Capsulation MOLAZ Method

Provided by: International Journal of Computer Science and Network Security
Topic: Security
Format: PDF
Concealment of information is the most important things of interest to scientists and users alike. The work of many researchers to find new ways and methods for building specialized systems to protect the information from hackers. The method of those techniques AES and an adopted by the U.S. department of defense and launched in the eighties to the world. Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm.

Find By Topic