1.

3D Textured Model Encryption Using 2D Logistic and 3D Lorenz Chaotic Map

Volume 21, Issue 4, December 2021, Pages 90-103
Nashwan Alsalam Ali; Abdul Monem S Rahma; Shaimaa h. Shaker

2.

A Compartive Study Between (AES) and (DES) Algorithms Based on the (SET) Protocol

Volume 13, Issue 3, September 2018, Pages 64-74
Khattab O. Khorsheed

3.

A Development of Least Significant Bit Steganography Technique

Volume 20, Issue 1, January 2020, Pages 31-39
Mohammed Majid Msallam

4.

A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes

Volume 29, Issue 3, December 2016, Pages 209-221
Rahim Abdul-Al Sahib Ogla

5.

A Hybrid Verifiable and Delegated Cryptographic Model in Cloud Computing

Volume 26, Issue 3, September 2018, Pages 67-74
Jaber Ibrahim Naser

6.

A Modification on Key Stream Generator for RC4 Algorithm

Volume 38, 2B, July 2020, Pages 54-60
Suhad M. Kareem; Abdul Monem S. Rahma

7.

A Modified Technique For Image Encryption

Volume 5, Issue 1, February 2010, Pages 1-11
Dr. Turki Y. Abdalla; Hameed A. Younis

8.

A New Algorithm to Encryption and Compression Image Data File

Volume 24, Issue 1, March 2011, Pages 108-118
Riyad Mubarak Abdullah

9.

A New Technique For Image Encryption

Volume 6, Issue 2, June 2011, Pages 1-11
Dr. Turki Y. Abdalla; Hameed A. Younis

10.

Apply Block Ciphers Using Tiny Encryption Algorithm (TEA)

Volume 7, Issue 2, June 2010, Pages 1061-1069
Hana Rashied Ismaeel

11.

A Proposed Algorithm to Improve the Security Level of Advanced Encryption Standard

Volume 8, Issue 4, December 2012, Pages 29-32
H.M. Azzawi

12.

A Proposed Method for Encrypting Data In Image by Using Cryptography Technique and Steganography

Volume 0, Issue 22, August 2017, Pages 95-109
Hasan M. Azzawi

13.

A Random Key Generation Approach for Rijndael Algorithm

Volume 15, Issue 3, September 2012, Pages 190-195
Dalal Naeem Hmood

14.

A Secure Enhancement for Encoding/ Decoding data using Elliptic Curve Cryptography

Volume 59, Issue 1, April 2018, Pages 189-198
Kawther E. Abdullah; Nada Hussein M. Ali

15.

Build Encrypted Chat System by using multicast technique with determine delay time

Volume 4, Issue 1, June 2014, Pages 215-220
Atheer Y. Oudah; Wessam A. hamed; Hyder Y. Atwan

16.

Chaotic Encryption Based on Biometric Key

Volume 7, Issue 3, December 2010, Pages 183-198
Saja J. Mohammed; Melad jader saeed; Ielaf O. Abdul Majjed

17.

Ciphering an Embedded Text Based in Magic Squares (MS) and It's Applications

Volume 19, Issue 5, August 2014, Pages 135-137
Mageed Hameed Ali

18.

CIPHERING OF TEXT BY USING SHFIT REGISTER TECHNIQUE AND ITS TRANSMISSION OVER OPTICAL FIBER

Volume 3, Issue 1, March 2010, Pages 91-108
Haider J. Abd; Mohanned Hassan Ali

19.

Data encryption Using Backpropagation Neural Network

Volume 15, Issue 2, August 2010, Pages 112-117
Raid R. Al-nima

20.

Data integrity enhancement for the encryption of color images based on CRC64 technique using multiple look-up tables

Volume 58, Issue 3, June 2018, Pages 1729-1739
Nada Hussein M. Ali; Ruaa A. Abdul-Sattar

21.

Data Security Protection in Cloud Computing by using Encryption

Volume 12, Issue 4, December 2017, Pages 276-286
Asst. Lec. Ghassan Sabeeh Mahmood

22.

Design and Simulation of Secure Communication System

Volume 18, Issue 4, August 2014, Pages 155-161
Ahmed S. Hadi; Zaid Ali Salman; Saleem M. Mohammed

23.

Design New Algorithm For Partial Image Encryption Based colors Space

Volume 20, Issue 2, June 2012, Pages 458-471
Ali A.Yassin

24.

Development AES Algorithm to Encryption Images and Sounds Files

Volume 9, Issue 1, June 2012, Pages 113-127
Mohammed C.Y. Al-Zubaidy

25.

Encrypt and Hide Data in True Color Image Classes

Volume 10, Issue 3, September 2013, Pages 75-89
Maha A. Hasso; Shahad A. Hasso; Ban Ghanem Maayouf

First Page Previous Page 1 2 3 Next Page Last Page


Journal Management System. Powered by ejournalplus.com