Some features of the site may not work correctly. DOI: Published 1 March Computer Science Al-Mustansiriyah Journal of Sciences Securing information has been the most significant process for communication and data store. Orderly to secure information such as data authentication, data integrity, and confidentiality must be verified based on algorithms of cryptography. Where, the most important part of any encryption algorithms is the key which specifies if the system is strong enough or not.
The proposal of this paper is a new method to generate keys based on two kinds of chaos theory in order to improve the security of… Expand.
View PDF. Save to Library Save. Create Alert Alert. Share This Paper. Figures, Tables, and Topics from this paper. Communication is a meaningful exchange of information between two or more entities. In this era of e-communication i. Highly Influential. View 9 excerpts, references methods and background. In which you can see such amazing functions, you can easily open document, modify, enlarge or shrink the page, insert the object, change the font, font size, colors and other text attributes, collage elements.
This software allows you to modify any contents in any existing PDF file types and unlimited number of pages. It gives you best medium for viewing PDF files. It is a best tool that lets you edit PDF files without requiring additional components installed. By using this software you can Opening a PDF file in the familiar interface can be done by using the file explorer, or via the drag and drop method.
In order to edit text, you must select individual pieces. It is very useful software which has millions of downloads around the whole world.
0コメント