1.

A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique

Volume 23, Issue 3, September 2023, Pages 186-196
Yasmin A. Hassan; Abdul Monem S. Rahma

2.

A Cooperation of Fog Computing and Smart Gateways in a Secure and Efficient Architecture for IoT-Based Smart Homes

Volume 37, 7A, July 2019, Pages 290-301
Amin H. Seno; Sahar A. Alshammari

3.

Active Network Security Based RSA Algorithm

Volume 15, Issue 4, December 2009, Pages 4163-4175
Wisam haitham abbood; Ahmed Freidoon Fadhil

4.

Adding Perfect Forward Secrecy To Kerberos

Volume 16, Issue 1, March 2010, Pages 4593-4605
Wameedh Nazar Flayyih

5.

A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment

Volume 37, 5A, May 2019, Pages 172-180
Maytham Azhar; Amin H. Seno

6.

A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes

Volume 29, Issue 3, December 2016, Pages 209-221
Rahim Abdul-Al Sahib Ogla

7.

A New Algorithm for Less Distortion and High Capacity Steganography Model Using Blocks-Based Method

Volume 28, Issue 13, June 2010, Pages 2592-2607
Wathiq L. Abd Ali; Salah Mahdi Saleh

8.

A New Algorithm of Automatic Complex Password Generator Employing Genetic Algorithm

Volume 26, Issue 2, June 2018, Pages 295-302
Sura Jasim Mohammed

9.

Applying Multi-Parity Code To The Quantum Security Protocol BB84 Under Different Types Of Attacks-ENG

Volume 21, Issue 5, October 2013, Pages 34-53
Dr. A. I. A. Jabbar; Ahmed I. A

10.

A Review: E-voting Security in Mobile Fog computing

Volume 23, Issue 1, March 2023, Pages 57-68
Asmaa Ibrahim Hussieen; Abeer Tariq MaoLood; Ekhlas Khalaf Gbash

11.

Cloud Based Secure Web Application

Volume 33, 8B, October 2015, Pages 1549-1560
Saad K. Majeed; Hanaa M. A. Salman; Ahmed Hashim Mohammed

12.

Color Images Hiding Based on Wavelet Based Fusion

Volume 29, Issue 15, November 2011, Pages 3158-3171
Saddam Kamil Alwane

13.

Combination of Cryptography and Channel Coding for Wireless Communications

Volume 0, Issue 26, September 2018, Pages 269-285
Mahmood Farhan Mosleh; Dalal A. Hammood

14.

Criminal substantive protection of victims of trafficking in human beings A comparative study

Volume 0, Issue 67, August 2017, Pages 1-56
Hassoun Obaid Hgej; Mazen behind Nasser

15.

Cultural Security of Indian Muslims: Sir Syed Ahmed Khan and His Legacy

Volume 6, Issue 4, September 2017, Pages 172-186
Asst.Lecu.Sujan Mondal

16.

Cyber Space War Concept – Tools and Applications

Volume 5, Issue 2, December 2016, Pages 121-152
Lecturer Dr. Anmar Mosa Jawad

17.

Cyber war and its impact on national security (Iraq as an example(

Volume 14, Issue: 1 part 1, March 2024, Pages 899-924
Mahmood Yaseen Ahmed; Mohammed Jubair abbas

18.

Data Security Protection in Cloud Computing by using Encryption

Volume 12, Issue 4, December 2017, Pages 276-286
Asst. Lec. Ghassan Sabeeh Mahmood

19.

Emergency Fuel Rationing system using RFID Smart Cards

Volume 13, Issue 1, March 2017, Pages 148-157
Noor Ahmed Khudhur

20.

Encrypted Block Code

Volume 15, Issue 1, March 2011, Pages 101-107
Ali H. Mahdi; Ahmed S. Hadi

21.

Factors Disrupting a Successful Implementation of E-Commerce in Iraq

Volume 20140429, Issue 0, December 2013, Pages 531-558
Mohammed Z.AL-Taie; Ali M. Kadhim

22.

FPGA REALIZATION OF SPEECH SCRAMBLING USING SPARTAN-XL ELECTRONIC PLATFORMS

Volume 3, Issue 1, March 2010, Pages 79-90
Dr. Mohammed N. Al-Turfi

23.

Hiding 9 Gray Images In RGB Image and Using Filters For Noise Removing

Volume 36, 11A, November 2018, Pages 1144-1147
Haraa R. Hatem

24.

Hiding Data in a Colored Image using the Similarity and Knapsack Algorithm

Volume 0, Issue 42, August 2018, Pages 431-442
Sana Ahmed Kadhom Sana Ahmed Kadhom

25.

Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain

Volume 43, Issue 1, June 2017, Pages 45-49
Ayoob Abdulmunem Abdulhameed; Ali Makki Sagheer; Kassim Mohammed Awad

First Page Previous Page 1 2 3 Next Page Last Page


Journal Management System. Powered by ejournalplus.com