Digital Library
Search Results: [ keyword: Encryption ] (94)
Khaled H. Abuhmaidan,
Marwan A. Al-Share,
Abdallah M. Abualkishik,
Ahmad Kayed,
Vol. 18, No. 6, June 30, 2024
10.3837/tiis.2024.06.011
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
3.
New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption
Mohammed Abdul Majeed,
Rossilawati Sulaiman,
Zarina Shukur,
Vol. 18, No. 1, January 31, 2024
10.3837/tiis.2024.01.010
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
6.
Securing the Information using Improved Modular Encryption Standard in Cloud Computing Environment
7.
Black box-assisted fine-grained hierarchical access control scheme for epidemiological survey data
Xueyan Liu,
Ruirui Sun,
Linpeng Li,
Wenjing Li,
Tao Liu,
Vol. 17, No. 9, September 30, 2023
10.3837/tiis.2023.09.013
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Chohee Bae,
Sojung Oh,
Sohyun Joo,
Jiyeon Joo,
KyungLyul Lee,
Vol. 17, No. 2, February 28, 2023
10.3837/tiis.2023.02.017
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)