GIWA, T.A.,ABIODUN, O.I.,OMOLARA, A.E.,ISIAKA, R.M., (2023). A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime, 12(2), 9-22. Retrieve from https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., 2023. A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime 12(2), 9-22. Available from: https://www.ijisc.comT.A. GIWA, O.I. ABIODUN, A.E. OMOLARA, R.M. ISIAKA, "A Hybridized Honey Encryption for Data Security using Residue Number System," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 9-22, 2023. Available: https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., 'A Hybridized Honey Encryption for Data Security using Residue Number System', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 9-22, (2023).GIWA, T.A.,ABIODUN, O.I.,OMOLARA, A.E.,ISIAKA, R.M.,: A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime 12 (2023) 9-22. https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., (2023), A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime, 12: 9-22. https://www.ijisc.com Citation Format :
AHUBELE, B.,UGBARI, A., (2022). Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime, 11(1), 31-40. Retrieve from https://www.ijisc.comAHUBELE, B., UGBARI, A., 2022. Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime 11(1), 31-40. Available from: https://www.ijisc.comB. AHUBELE, A. UGBARI, "Data Protection for Users in Cloud Computing," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 31-40, 2022. Available: https://www.ijisc.comAHUBELE, B., UGBARI, A., 'Data Protection for Users in Cloud Computing', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 31-40, (2022).AHUBELE, B.,UGBARI, A.,: Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime 11 (2022) 31-40. https://www.ijisc.comAHUBELE, B., UGBARI, A., (2022), Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime, 11: 31-40. https://www.ijisc.com Citation Format :
GĂBUDEANU, L. (2022). Trends in Interpretation of EU Data Protection Authorities of Cybersecurity Requirements Under the GDPR. International Journal of Information Security and Cybercrime, 11(1), 9-14. Retrieve from https://www.ijisc.comGĂBUDEANU, L., 2022. Trends in Interpretation of EU Data Protection Authorities of Cybersecurity Requirements Under the GDPR. International Journal of Information Security and Cybercrime 11(1), 9-14. Available from: https://www.ijisc.comL. GĂBUDEANU, "Trends in Interpretation of EU Data Protection Authorities of Cybersecurity Requirements Under the GDPR," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 9-14, 2022. Available: https://www.ijisc.comGĂBUDEANU, L., 'Trends in Interpretation of EU Data Protection Authorities of Cybersecurity Requirements Under the GDPR', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 9-14, (2022).GĂBUDEANU, L.: Trends in Interpretation of EU Data Protection Authorities of Cybersecurity Requirements Under the GDPR. International Journal of Information Security and Cybercrime 11 (2022) 9-14. https://www.ijisc.comGĂBUDEANU, L., (2022), Trends in Interpretation of EU Data Protection Authorities of Cybersecurity Requirements Under the GDPR. International Journal of Information Security and Cybercrime, 11: 9-14. https://www.ijisc.com Citation Format :
BĂDIŢĂ, A.G. (2017). The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime, 6(2), 17-22. Retrieve from https://www.ijisc.comBĂDIŢĂ, A.G., 2017. The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime 6(2), 17-22. Available from: https://www.ijisc.comA.G. BĂDIŢĂ, "The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 17-22, 2017. Available: https://www.ijisc.comBĂDIŢĂ, A.G., 'The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 17-22, (2017).BĂDIŢĂ, A.G.: The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime 6 (2017) 17-22. https://www.ijisc.comBĂDIŢĂ, A.G., (2017), The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime, 6: 17-22. https://www.ijisc.com Citation Format :