News

Testing and programming a method have demonstrated its high encryption efficiency, strong security, and the use of compact keys, aligning well with user requirements.
In this paper an asymmetric key algorithm is used towards provide effective safety measures. At first new files encrypted with the QAES algorithm at the end of the data holder and then stored in the ...
IGIS Tech Notes describe workflows and techniques for using geospatial science and technologies in research and extension.