Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Budoor Alroithy
Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination
Journal of Information Security and Cybercrimes Research
Related publications
Secure Hash Authentication and Cryptography Based Geographical Routing (SHAC-GR) for Wireless Sensor Networks
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation
Secure Virtualisation Using Hash Key Authentication
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
Multi-Cloud Mobile Computing for Secure Storage of Data Using Cryptography
International Journal of Recent Trends in Engineering and Research
A Secure Perceptual Hash Algorithm for Image Content Authentication
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
The Combination of Steganography and Cryptography for Medical Image Applications
International Journal of Advances in Applied Sciences
Secure Authentication Protocol for Mobile Payment
Tsinghua Science and Technology
Multidisciplinary
Advanced Secure User Authentication Framework for Cloud Computing
International Journal on Smart Sensing and Intelligent Systems
Control
Systems Engineering
Electrical
Electronic Engineering
Computing and Relaying: Utilizing Mobile Edge Computing for P2P Communications
IEEE Transactions on Vehicular Technology
Electronic Engineering
Automotive Engineering
Computer Networks
Applied Mathematics
Communications
Electrical
Aerospace Engineering
Secure Mobile Multi Cloud Architecture for Authentication and Data Storage
International Journal of Cloud Applications and Computing