Found about 2 results
Downloads: 134
Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013
352 - 357A Study: Cryptology Techniques and Methodologies
Cutifa Safitri [5] | Haroon Shoukat Ali [2] | Jamaludin Bin Ibrahim [4]
Share this Article
Downloads: 116
Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
2556 - 2562Wireless Sensor Networks: An Overview from an Optimization Perspective
Haroon Shoukat Ali [2] | NoorAzian Mohamad Ali
Share this Article