A. Ahmad, Mohammad and Alshaikhli, Imad Fakhri Taha and Mohammad Ahmed, Hanady and Shah, Asadullah (2011) Protection mechanisms using MD5 and Base64. In: Computer Applications: Theories and Applications. IIUM Press, Kuala Lumpur, pp. 59-69. ISBN 978-967-418-107-9
| ![[img]](http://irep.iium.edu.my/style/images/fileicons/application_pdf.png) 
 | PDF (Protection mechanisms using MD5 and Base64 )
 - Published Version Download (436kB) | Preview | 
| Item Type: | Book Chapter | 
|---|---|
| Additional Information: | 6534/20190 | 
| Uncontrolled Keywords: | Protection mechanisms, MD5, Base64 | 
| Subjects: | Q Science > QA Mathematics > QA76 Computer software T Technology > T Technology (General) | 
| Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): | Kulliyyah of Information and Communication Technology Kulliyyah of Information and Communication Technology | 
| Depositing User: | Prof Asadullah Shah | 
| Date Deposited: | 08 Jan 2013 13:00 | 
| Last Modified: | 18 Nov 2020 16:59 | 
| URI: | http://irep.iium.edu.my/id/eprint/20190 | 
Actions (login required)
|  | View Item | 
 
	
	 Download Statistics
 Download Statistics Download Statistics
 Download Statistics