1.

A Comprehensive Study of Traditional and Deep-learning Schemes for Privacy and Data Security in the Cloud

Volume 16, Issue 2, December 2022, Pages 35-24
mohammed Fawzy sheet; Melad jader saeed

2.

Authentication of data hiding using co-occurrence matrix

Volume 9, Issue 1, June 2012, Pages 67-78
Melad jader saeed; Ghada thanoon

3.

Chaotic Encryption Based on Biometric Key

Volume 7, Issue 3, December 2010, Pages 183-198
Saja J. Mohammed; Melad jader saeed; Ielaf O. Abdul Majjed

4.

Development Hyper Algorithm for Encryption Arabic Text using Mors Code

Volume 4, Issue 1, June 2007, Pages 193-209
Najla Dabagh; Melad jader saeed; Subhi Hamadi

5.

Hiding Encryption Text by DNA using Exploiting Modification Direction Algorithm

Volume 15, Issue 1, June 2021, Pages 147-158
Mohammad S. Hashim; Melad jader saeed

6.

Hyper Secure Algorithm for Text

Volume 8, Issue 2, December 2011, Pages 51-65
Melad jader saeed

7.

Stream Cipher Using Genetic Algorithm

Volume 6, Issue 3, December 2009, Pages 111-126
Melad jader saeed


Journal Management System. Powered by ejournalplus.com