Showing Results for
From:PeerJ Computer Science (Vol. 7) Peer-ReviewedThe biggest challenge for symmetric cryptosystems is to replace their static substitution with dynamic substitution, because static substitution S-boxes make the symmetric block ciphers more vulnerable to attacks....
From:PeerJ Computer Science (Vol. 7) Peer-ReviewedResearch of the techniques for effective fake news detection has become very needed and attractive. These techniques have a background in many research disciplines, including morphological analysis. Several researchers...
Choose how you want to be alerted when new results for your search become available.
Subscribe to Gale's RSS feed to get content delivered to your favorite RSS aggregator. Copy and paste the URL below into your reader:
Tell us where to send the alert and how often you want to receive it