Login New user?  
04-Information Sciences Letters
An International Journal
               
 
 
 
 
 
 
 
 
 
 
 
 

Content
 

Vol. 5 > Sep. 2016

 

 

Multi-Service Data Security Algorithm Based on Substitution Ciphers and Hadamard Transform, Vol. 5, No. 3 (Sep. 2016), PP:53-62

doi:10.18576/isl/050301

Download

Authors:
Marghny H. Mohamed - Department of Computer Science, Faculty of Computers and Information, Assiut University, Egypt
T. A. Tammam - Department of Computer Science, Faculty of Computers and Information, Assiut University, Egypt

 

N-Group SU-Action and its Applications to N-Group Theory, Vol. 5, No. 3 (Sep. 2016), PP:63-69

doi:10.18576/isl/050302

Download

Authors:
Aslıhan Sezgin - Department of Mathematics, Amasya University, 05100 Amasya, Turkey
kın Osman Atagun - Yozgat, Turkey
Naim Cagman - Department of Mathematics, Gaziosmanpas ̧a University, Tokat, Turkey

 

Employing Multi-Level Authentication Protocol for Securing Intelligent Systems, Vol. 5, No. 3 (Sep. 2016), PP:71-79

doi:10.18576/isl/050303

Download

Authors:
Ahmed A. Elngar - Math & Computer Science Department, Faculty of Science , Al-Azhar University, Cairo, Egypt
Kamal A. ElDahshan - Math & Computer Science Department, Faculty of Science , Al-Azhar University, Cairo, Egypt
Ashraf Aboshosha - NCRRT, Atomic Energy Authority, Cairo, Egypt
Eman K. Elsayed - Math & Computer Science Department, Faculty of Science , Al-Azhar University, Cairo, Egypt

  Home   About us   News   Journals   Conferences Contact us Copyright naturalspublishing.com. All Rights Reserved