Institutional Repository

Browsing Unisa ETD by Subject "Cryptography"

Browsing Unisa ETD by Subject "Cryptography"

Sort by: Order: Results:

  • Maat, Sandra Mariana (2009-08-25)
    The Electronic Communications and Transactions Act, 25 of 2002, eradicated various lacunae that previously existed in respect of cyber crimes. Cyber crimes such as inter alia hacking, rogue code, unauthorised modification ...
  • Chohan, Farad Hoosen (2021-01)
    The ubiquitous and innocuous nature of spam email makes it an ideal carrier for covert-based communications, particularly linguistic steganography, which seeks to conceal sensitive information within a body of text through ...
  • Kortekaas, Birgit Friederike (2009-08-25)
    As today, the traditional payment systems of cash, cheques and credit cards are being supplemented by electronic cheques, electronic credit card-based systems, and token-based systems, online security is of utmost ...
  • Muthavhine, Khumbelo Difference (2022-05)
    Cryptographic attacks on Internet of Things (IoT) devices are not highly con sidered by the users of IoT. Most cryptographic algorithms commonly used on IoT devices are vulnerable to cryptographic attacks. Cryptography ...
  • Stevens, Charles Cater (1996-11)
    Redundancy in plaintext is a fertile source of attack in any encryption system. Compression before encryption reduces the redundancy in the plaintext, but this does not make a cipher more secure. The cipher text is still ...

Search UnisaIR


Browse

My Account