Showing 1 - 6 results of 6 for search '"Bob ', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    A New Cryptosystem Based on Decimal Numbers and Nonlinear Function by Alfaris, Rand Qusay

    Published 2009
    “…A secret key is shared between Alice and Bob to construct their decimal public keys, so that, we can say this cryptosystem is symmetric and asym- metric. …”
    Get full text
    Thesis
  5. 5

    A Robust Cover Generation Technique for Steganography Using 2D Images by Ahmad Zawawi, Md. Nabil

    Published 2006
    “…The problem describes a scenario where two prisoners named Alice and Bob that are put in two different cells and needed to communicate an escape plan with each other. …”
    Get full text
    Thesis
  6. 6

    Preliminary evaluation of a hydrophilic microfiltration membrane in treating high strength wastewater by Mohamed Ali, Thamer Ahmad, Megat Mohd Noor, Megat Johari, Abdullah, Abdul Ghani Liew

    Published 2009
    “…Results obtained from the bench scale unit show a gradual increase in the percentage removal of COD, BOB and TOC with time and it increased from 0 to 75% from the 1st day to the 8th day while only a 20% increment was observed from the 8th day up to the end of the test. …”
    Get full text
    Article