Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Promoting Flowering and Yield in Indonesian Shallot Varieties Through the Application of Gibberellins
https://www.iieta.org/sites/default/files/pdf/2023-12/ijdne_18.06_26.pdf
Simple Hash Based Symmetric Encryption Mechanism for Dynamic Groups
https://www.iieta.org/sites/default/files/pdf/2023-12/ijsse_13.06_10.pdf
Development of an Affordable Real-Time IoT-Based Surveillance System Using ESP32 and TWILIO API
https://www.iieta.org/sites/default/files/pdf/2023-12/ijsse_13.06_09_0.pdf
Development of a Method for Determining the List of Key Threats to Information Security of Computer Networks
https://www.iieta.org/sites/default/files/pdf/2023-12/ijsse_13.06_06.pdf
A Lightweight Blockchain to Secure Data Communication in IoT Network on Healthcare System
https://www.iieta.org/sites/default/files/pdf/2023-12/ijsse_13.06_04.pdf
Effects of Insecurity, Terrorism and Political Instability on Foreign Direct Investment Inflows in Nigeria
https://www.iieta.org/sites/default/files/pdf/2023-12/ijsse_13.06_12_0.pdf
Enhancing Key Exchange Security: Leveraging RSA Protocol in Encryption Algorithm Based on Hyperchaotic System
https://www.iieta.org/sites/default/files/pdf/2023-12/ijsse_13.06_16.pdf
Roadmap and Information System to Implement Information Technology Risk Management
https://www.iieta.org/sites/default/files/pdf/2023-12/ijsse_13.06_02.pdf
Advancing Public Health Monitoring through Secure and Efficient Wearable Technology
https://www.iieta.org/sites/default/files/pdf/2023-12/ijsse_13.06_03.pdf
Designing a Model for Hiding Images in RGB Cover Image Based Scrambling and Encryption Methods
https://www.iieta.org/sites/default/files/pdf/2023-12/ijsse_13.06_20.pdf
Pages
« first
‹ previous
…
652
653
654
655
656
657
658
659
660
…
next ›
last »