1.

A Cooperation of Fog Computing and Smart Gateways in a Secure and Efficient Architecture for IoT-Based Smart Homes

Volume 37, 7A, July 2019, Pages 290-301
Amin H. Seno; Sahar A. Alshammari

2.

Active Network Security Based RSA Algorithm

Volume 15, Issue 4, December 2009, Pages 4163-4175
Wisam haitham abbood; Ahmed Freidoon Fadhil

3.

Adding Perfect Forward Secrecy To Kerberos

Volume 16, Issue 1, March 2010, Pages 4593-4605
Wameedh Nazar Flayyih

4.

A Framework Prototype for E-Authentication of Iraqi Civil-Identity Certificate

Volume 41, Issue 1, December 2014, Pages 20-25
Aws A. Abdulsahib; Imad J. Mohamad

5.

A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment

Volume 37, 5A, May 2019, Pages 172-180
Maytham Azhar; Amin H. Seno

6.

A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes

Volume 29, Issue 3, December 2016, Pages 209-221
Rahim Abdul-Al Sahib Ogla

7.

A modify Correlation Filters for face Verification Kadhim M. Al-Mousawi(1) , Kadhim H. Al-Ibraheemi(1) , AbrarK.Al-Sharify(2)

Volume 7, Issue 2, December 2017, Pages 75-85
Kadhim M. Al-Mousawi; Kadhim H. Al-Ibraheemi; AbrarK.Al-Sharify

8.

A New Algorithm of Automatic Complex Password Generator Employing Genetic Algorithm

Volume 26, Issue 2, June 2018, Pages 295-302
Sura Jasim Mohammed

9.

Application of Chaotic Neural Network for Authentication using the Database

Volume 11, Issue 1, June 2014, Pages 81-95
Ammar Thaher Yaseen Abd Alazeez

10.

A Proposed Secure Protocol for E-Mail System Based on Authentication and Hash Function

Volume 29, Issue 16, December 2011, Pages 3291-3301
Muna Mohammed Al-Nayar

11.

A Proposed System for Sound Retrieval Using MAS and ANN

Volume 30, Issue 14, August 2012, Pages 2480-2492
Abeer Tariq; Ikhlas khalaf; shatha habeeb

12.

Artificial Neural Networks Based Fingerprint Authentication

Volume 33, 5A, June 2015, Pages 1255-1271
Abbas H. Issa

13.

A Secure Mobile Banking Using Kerberos Protocol

Volume 27, Issue 6, April 2009, Pages 1127-1133
Mohammad N. Abdullah; May T. Abdul-Hadi

14.

Authenticated Transmission of Client Server Network

Volume 7, Issue 3, July 2017, Pages 44-54
Rawaa Mohammed Abdul Hussein

15.

Authentication and Secure Image System Based on Combining Image Cryptography and Digital Watermarking

Volume 11, Issue 4, December 2015, Pages 186-198
Manaf Mohammed Ali

16.

Authentication of Deoxyribo Nucleic Acid (DNA)

Volume 10, Issue 1, March 2013, Pages 17-23
Naglaa Badi Ibrahim; Yassin Hikmat Ismail

17.

Blockchain Fog-based scheme for identity authentication in smart building

Volume 16, Issue 3, September 2023, Pages 218-227
Alexander A. Varfolomeev; Liwa H. Al-Farhani

18.

Data Security Protection in Cloud Computing by using Encryption

Volume 12, Issue 4, December 2017, Pages 276-286
Asst. Lec. Ghassan Sabeeh Mahmood

19.

Digital Watermarking in Color Image Based On Joint Between DCT and DWT

Volume 30, Issue 1, June 2017, Pages 237-245
Jasim Mohammed Salih Ismail

20.

HMAC Modification Using New Random Key Generator

Volume 14, Issue 1, April 2014, Pages 72-82
Dr. Shaimaa H. Shaker

21.

Human Authentication with Earprint for Secure Telephone System

Volume 12, Issue 2, December 2012, Pages 47-55
Raid R. Al-Nima

22.

Key Exchange Protocol Supporting Mobility and Multihoming

Volume 1, Issue 1, May 2008, Pages 11-30
Abdul-Karim A-R. Kadhim; Sufyan T. Faraj; Mohammed A. Tawfiq

23.

Message Authentication Using New Hash Function

Volume 19, Issue 3, September 2016, Pages 148-153
Hasanen S. Abdulah; Maha A. Hamood Al-Rawi; Dalal N. Hammod

24.

Protection Against Internal Intruding using Host Identifier Authentication

Volume 6, Issue 1, April 2009, Pages 223-236
Basil Y. Alkhayaat; Abdulsattar M. khidhir; Omar A. Ibraheem

25.

Secret Sharing Scheme Based Technique for Authentication of Documents Images

Volume 32, 6B, June 2014, Pages 1092-1105
Muna Ghazi; Hanaa M. A. Salman

First Page Previous Page 1 2 Next Page Last Page


Journal Management System. Powered by ejournalplus.com