共 33 条
[1]
Abobeah R. M., 2015, Int. J. Comput. Networks Appl., V2, P64
[2]
Ahmed S., 2022, Int. J. Sci. Res. Publ., P161, DOI [10.29322/ijsrp.12.07.2022.p12720, DOI 10.29322/IJSRP.12.07.2022.P12720]
[3]
Al Busafi Samya, 2020, Proceedings of the 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), P323, DOI 10.1109/SMART50582.2020.9336792
[5]
Phishing Attacks: A Recent Comprehensive Study and a New Anatomy
[J].
FRONTIERS IN COMPUTER SCIENCE,
2021, 3
[7]
Bafandehkar M, 2013, INT CONF IT CONVERGE
[8]
Comparison of ECC and RSA Algorithm with DNA Encoding for IoT Security
[J].
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021),
2021,
:1340-1343
[9]
Scalable Implementation of Array of 8-bit-Based RSA With Large Key Size
[J].
PROCEEDINGS OF THE 2022 5TH INTERNATIONAL CONFERENCE ON ADVANCED SYSTEMS AND EMERGENT TECHNOLOGIES IC_ASET'2022),
2022,
:375-380
[10]
Dubai M. J., 2011, 2011 3rd International Conference on Electronics Computer Technology (ICECT 2011), P99, DOI 10.1109/ICECTECH.2011.5941965