Theme-Logo
  • Login
  • Home
  • Course
  • Publication
  • Theses
  • Reports
  • Published books
  • Workshops / Conferences
  • Supervised PhD
  • Supervised MSc
  • Supervised projects
  • Education
  • Language skills
  • Positions
  • Memberships and awards
  • Committees
  • Experience
  • Scientific activites
  • In links
  • Outgoinglinks
  • News
  • Gallery
Number of publications : 13
Performance Evaluation of Symmetric Encryption Algorithms,International Journal of the International Business Information Management Association International Business Information Management Association (CIBIMA) , VOL.8 No.8, pp: 58- 63, January 2009. (ISSN: 1943-7765) Performance Evaluation of Symmetric Encryption Algorithms, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12 pp: 280- 286, December 2008.(ISSN: 1738-7906) Evaluating The Performance of Symmetric Encryption Algorithms. IJ Network Security 10 (3), 216-222 Performance evaluation of symmetric encryption algorithms Authors Diaa Salama Abdul Elminaam, Hatem Mohamed Abdul Kader, Mohie Mohamed Hadhoud Publication date 2008/12 Journal IJCSNS International Journal of Computer Science and Network Security Volume 8 Issue 12 Pages 280-286 Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. Authors Diaa Salama Abdul Minaam, Hatem Mohamed Abdual-Kader, Mohiy Mohamed Hadhoud Publication date 2010/9/1 Journal IJ Network Security Volume 11 Issue 2 Pages 78-87 Wireless Network Security Still Has no Clothes Authors Diaa Salama, Hatem Abdual Kader, Mohiy Hadhoud Publication date 2011/6 Journal International Arab Journal of e-Technology Volume 2 Issue 2 Pages 112-123 Tradeoffs between Energy Consumption and Security of Symmetric Encryption Algorithms Authors Elminaam Diaa Salama Abdual, Kader Hatem Mohamed Abdual, Hadhoud Mohiy Mohamed Publication date 2009/8 Journal International Journal of Computer Theory and Engineering Volume 1 Issue 3 Pages 325-333 Evaluating The Performance of Symmetric Encryption Algorithms. Authors Diaa Salama Abd Elminaam, Hatem Mohamed Abdual-Kader, Mohiy Mohamed Hadhoud Publication date 2010/5/1 Journal IJ Network Security Volume 10 Issue 3 Pages 216-222 An Adaptive Fitness-Dependent Optimizer for the One-Dimensional Bin Packing Problem
Full paper
Chaotic NHCP: Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory.
Full paper
A chaotic owl search algorithm based bilateral negotiation model
Full paper
SMCACC: Developing an Efficient Dynamic Secure Framework for Mobile Capabilities Augmentation Using Cloud ComputingSMCACC: Developing an Efficient Dynamic Secure Framework for Mobile Capabilities Augmentation Using Cloud Computing
Full paper
Recent Methodology-Based Gradient-Based Optimizer for Economic Load Dispatch Problem
Full paper
Research Fields
Benha University © 2023 Designed and developed by portal team - Benha University