Search
Now showing items 1-2 of 2
The performance of Blum-Blum-Shub elliptic curve pseudorandom number generator as WiFi protected access 2 security key generator
(Association for Computing Machinery, 2018-09-20)
WiFi Protected Access 2 (WPA2) is considered the most secure network security protocol in wireless routers, despite the discovery of partial key exposure vulnerability. In light of, an experiment was conducted to investigate ...
Using a modified approach of blowfish algorithm for data security in cloud computing
(Association for Computing Machinery, 2018-12-29)
Cloud computing brought remarkable potential changes and excellent opportunities to the information technology industry. It is particularly useful in most of the networked transactions. Cloud computing common issue problems ...



