ABIODUN, A.,LAWAL, O.,OYEBIYI, O.,JOSEPH, O.,ADETORO, A., (2021). Performance Evaluation of Selected Encryption Algorithms. International Journal of Information Security and Cybercrime, 10(2), 21-30. Retrieve from https://www.ijisc.comABIODUN, A., LAWAL, O., OYEBIYI, O., JOSEPH, O., ADETORO, A., 2021. Performance Evaluation of Selected Encryption Algorithms. International Journal of Information Security and Cybercrime 10(2), 21-30. Available from: https://www.ijisc.comA. ABIODUN, O. LAWAL, O. OYEBIYI, O. JOSEPH, A. ADETORO, "Performance Evaluation of Selected Encryption Algorithms," International Journal of Information Security and Cybercrime, vol. 10, no. 2, pp. 21-30, 2021. Available: https://www.ijisc.comABIODUN, A., LAWAL, O., OYEBIYI, O., JOSEPH, O., ADETORO, A., 'Performance Evaluation of Selected Encryption Algorithms', International Journal of Information Security and Cybercrime, vol. 10, no. 2, 21-30, (2021).ABIODUN, A.,LAWAL, O.,OYEBIYI, O.,JOSEPH, O.,ADETORO, A.,: Performance Evaluation of Selected Encryption Algorithms. International Journal of Information Security and Cybercrime 10 (2021) 21-30. https://www.ijisc.comABIODUN, A., LAWAL, O., OYEBIYI, O., JOSEPH, O., ADETORO, A., (2021), Performance Evaluation of Selected Encryption Algorithms. International Journal of Information Security and Cybercrime, 10: 21-30. https://www.ijisc.com Citation Format :
AHUBELE, B.,UGBARI, A., (2022). Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime, 11(1), 31-40. Retrieve from https://www.ijisc.comAHUBELE, B., UGBARI, A., 2022. Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime 11(1), 31-40. Available from: https://www.ijisc.comB. AHUBELE, A. UGBARI, "Data Protection for Users in Cloud Computing," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 31-40, 2022. Available: https://www.ijisc.comAHUBELE, B., UGBARI, A., 'Data Protection for Users in Cloud Computing', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 31-40, (2022).AHUBELE, B.,UGBARI, A.,: Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime 11 (2022) 31-40. https://www.ijisc.comAHUBELE, B., UGBARI, A., (2022), Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime, 11: 31-40. https://www.ijisc.com Citation Format :
CHATTAMVELLI, R. (2022). A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime, 11(1), 49-58. Retrieve from https://www.ijisc.comCHATTAMVELLI, R., 2022. A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime 11(1), 49-58. Available from: https://www.ijisc.comR. CHATTAMVELLI, "A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 49-58, 2022. Available: https://www.ijisc.comCHATTAMVELLI, R., 'A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 49-58, (2022).CHATTAMVELLI, R.: A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime 11 (2022) 49-58. https://www.ijisc.comCHATTAMVELLI, R., (2022), A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime, 11: 49-58. https://www.ijisc.com Citation Format :
GIWA, T.A.,ABIODUN, O.I.,OMOLARA, A.E.,ISIAKA, R.M., (2023). A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime, 12(2), 9-22. Retrieve from https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., 2023. A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime 12(2), 9-22. Available from: https://www.ijisc.comT.A. GIWA, O.I. ABIODUN, A.E. OMOLARA, R.M. ISIAKA, "A Hybridized Honey Encryption for Data Security using Residue Number System," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 9-22, 2023. Available: https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., 'A Hybridized Honey Encryption for Data Security using Residue Number System', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 9-22, (2023).GIWA, T.A.,ABIODUN, O.I.,OMOLARA, A.E.,ISIAKA, R.M.,: A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime 12 (2023) 9-22. https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., (2023), A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime, 12: 9-22. https://www.ijisc.com Citation Format :