Information Sciences Letters
Volume 5, Issue 3 (2016) Sep. 2016
Multi-Service Data Security Algorithm Based on Substitution Ciphers and Hadamard Transform
Marghny H. Mohamed and T. A. Tammam
N-Group SU-Action and its Applications to N-Group Theory
Aslıhan Sezgin, kın Osman Atagun, and Naim Cagman
Employing Multi-Level Authentication Protocol for Securing Intelligent Systems
Ahmed A. Elngar, Kamal A. ElDahshan, Ashraf Aboshosha, and Eman K. Elsayed