1.

A biochemical study of the effect of Neonatal Jaundice on bilirubin concentration level in newborns

Volume 6, Issue 2, April 2010, Pages 83-89
Saba Abd Almunam; Rehab Jasem; Master; Rehab Jasem; Mohammed Nofill; Saba Abd Almunam; Areeg Shihab Ahmad; Areeg T.H. Abou-Dareb; Haider Y. Hammod; Adnan H. Ali; Rawa K.Ibrahim; Rewayda Razaq Mohsin; Rewayda Razaq Mohsin; Ali Fawzi Najm AL-Shammari; Alaa M.Alrubae; Rashid J. Abdulah; Ahmed Abdulhadi Ahmed; Haider Galil Al-Qurabi; Ali Abdulhussien Hassan; Eman jabbar K. Alghizzi; Rajaa Jabbar Kadhum; Nadia A. Al-Assady; Sahera G.Sayyah; Ayad I. Haddad; Ahmad A.Hasan; Bushra A.Hasan; EkramA.A; Mohammed K.J; Kawakib J.M; Mohammed J. S. Al-Haidarey; Dafer A. Al-Kufi; Meison A. Al-Selamy; Ibrahim M. Jassim; HASSANEEN JABBAR ABD; Taghreed M. D. Musa; Salam A. H. AL- Ameri; Reyadh M. Ahmed; Ali Aziz Abbas; Shaymaa A. M. Alhashimi; Mustafa T. Al-Kifae; Rassul M. Almaini; Firas Mohamed Abdul Ghani; Ali Farouk; Ahmed Sabeeh Abid Ali Al- Zubaidi; Eman Talib Kareem; ABDULJALEEL HUSSAIN ABD; SALAH NOORI ABBOOD; Hameed Aswad Mohammed; Mohammed Ali Radhy; Nawras Mohammed Shaheed Al-Dahan; Fadhil Ismail Shrrad Al-Taie; Ahmed Ali Abdulsahib Alkarimi; Muhanad Hayder; Sharifi; Hussein Ali Mohammed Al; Saher Ahmed Mohammed Al-Bassam; Maany Abd Al-Moneem Said; Hussein Hadi Abbas; Sareaa Maseer Gatya Al-Mayahie; Muhsen Cadem motleb; JawadKadhim Ali; Hassan Fadhil Al-Husseiny; Buthainah A. Ahmed

2.

Advanced Password Authentication Protection by Hybrid Cryptography & Audio Steganography

Volume 59, Issue 1, February 2018, Pages 600-606
Eman Salim Ibrahim Harba

3.

A Modification on Rivest Cipher (RC4) Algorithm Against FMS Wired Equivalent Privacy (WEP) Attack

Volume 0, Issue 20, July 2017, Pages 133-144
Dina Harith Shakir; May Sabri Mohammed; Mohammed A. Noaman

4.

A New Text Steganography Method by Using Non-Printing Unicode Characters and Unicode System Characteristics in English/Arabic documents

Volume 3, Issue 3, September 2013, Pages 192-200
Aliea Salman Saber AL - Mozani; Wid Akeel Jawad Awadh

5.

AN IMPROVED DATA CONFIDENTIALITY PROTOCOL BASED ON TIMESTAMP

Volume 12, Issue 1, June 2012, Pages 53-59
Amer Kais Obaid

6.

Apply Block Ciphers Using Tiny Encryption Algorithm (TEA)

Volume 7, Issue 2, June 2010, Pages 1061-1069
Hana Rashied Ismaeel

7.

A Proposed Method for Encrypting Data In Image by Using Cryptography Technique and Steganography

Volume 0, Issue 22, August 2017, Pages 95-109
Hasan M. Azzawi

8.

Authentication and Secure Image System Based on Combining Image Cryptography and Digital Watermarking

Volume 11, Issue 4, December 2015, Pages 186-198
Manaf Mohammed Ali

9.

Bioaccumulation of Some Trace elements in muscles of two species of fishes in Euphrates River near the center of Suq Al-Shouyukh city- south Iraq

Volume 5, Issue 2, June 2016, Pages 3-10
Afaq .T.Farhood; Rabab Ali Al-Mosawi; Bassad A. Al-Aboody; Manal B. Al-Temimi; Elham jwad kadhem bilale; Alaa Hussein Oleiwi AL-Awady; Amal KH. Khalaf; Ahmed H. Mohammad; Amal A. Mahmood; Nafaa. F. M. Al-Farhan; Manal B. Al-Tamemi; Khalid G. Al; Fartosi; Majida G . Magtooph; Abbas Hameed Al-Bedhany; Hawraa Ramadhan; Hamid Talib Al-Saad; Alaa Abdul Hassen Naif MD; Kadhim mohan manhil Al-majedy; Haider M. Hussein; Basim Y. Al-khafaji; Hazim T. Thwiny; Hassan J. Hasony; Kawther T. Khalaf; Khaled Kh. S. Al-Khafaji; Saleh Abud Kader Al-Essa; Amna Ali Hashem; Ali A. A. Al-Shawi; Ali Ghalib Mohammed Khidhir; Roaa Jafar El-Khairalla; Sabeeh H. Al-Mayah; Basim H. Abdullah; Nothiala R. Al- kassar; Huda Ameer Zaki; Yass K.Abbass; Ibtehal Q.Al-Sahlani; Wijdan R. Abdulhussien; Emad A. Mohammed; H. L. Saadon; Elisabet Perez-Cabre; Hassan H. Mohammed; Maria S. Millan; Shayma Thyab Gddoa Al-Sahlany; Amal Kadhim Al-Asady; Fatima F. Hassan; Saher A. Ali

10.

Ciphering an Embedded Text Based in Magic Squares (MS) and It's Applications

Volume 19, Issue 5, August 2014, Pages 135-137
Mageed Hameed Ali

11.

Combination of Cryptography and Channel Coding for Wireless Communications

Volume 0, Issue 26, September 2018, Pages 269-285
Mahmood Farhan Mosleh; Dalal A. Hammood

12.

Cryptanalysis of Stream Cipher System Using Particle Swarm Optimization Algorithm

Volume 6, Issue 2, April 2010, Pages 384-394
Sharifi; Hussein Ali Mohammed Al

13.

Cryptographic key Generation Using Fingerprint Biometrics

Volume 5, Issue 2, June 2016, Pages 75-79
Huda Ameer Zaki

14.

Cryptography Operation Using DNA Computing

Volume 6, Issue 1, January 2014, Pages 28-43

15.

Design and Hardware Implementation of a Speech Cipher System

Volume 10, Issue 1, December 2007, Pages 1-10
Muhanad D. Al-Bayati; Dr. Abbas A. Al-Shalchi; Dr. Siddeeq Y. Ameen

16.

Dihedral Cryptographic Technique

Volume 10, Issue 1, April 2018, Pages 26-31
Zainab Fahad Mhawes

17.

Efficient Plain Password Cryptanalysis Techniques

Volume 58, Issue 4, November 2018, Pages 1946-1954
Sajaa G. Mohammed; Abdulrahman H. Majeed

18.

Embedding Algorithm using multiple pseudo random number generators with LSB technique

Volume 0, Issue 55, December 2018, Pages 407-416
Aysar Sh. Alsaadi; Sewadi; Hamza A. A. Al

19.

Encryption of Images and Signals Using Wavelet Transform and Permutation Algorithm

Volume 22, Issue 9, December 2014, Pages 2617-2634
Ibtisam A. Aljazaery

20.

Enhance LFSR Cipher

Volume 0, Issue 15, August 2017, Pages 83-103
Louay A. Hussein Al-Nuamy

21.

Enhance the Hiding Image by Using Compression and Securing Techniques

Volume 43, Issue 1, June 2017, Pages 14-16
Saif Saad; Fouad H. Awad; Ahmed S. Farhan

22.

Enhancing The Encryption Process Of Advanced Encryption Standard (AES) By Using Proposed Algorithm To Generate S-Box

Volume 18, Issue 2, April 2014, Pages 89-105
Hasan M. Azzawi

23.

Enhancing The Security of Identity and Access Management in Cloud Computing using Elliptic Curve Cryptography

Volume 0, Issue 3, October 2017, Pages 329-342
Salim Ali Abbas; Amal AbdulBaqi Maryoosh

24.

Fast Dynamic Random Numbers Generator and Applications in Cryptosystems (FDRNG)

Volume 13, Issue 1, January 2017, Pages 25-40
Ismael Salih Aref; Ebtisam K. Abdulah; Taha Mohammed Hasan; Rajaa Ahmed Ali

25.

IMAGE ENCRYPTION BASED ON FRACTIONAL ORDER LORENZ SYSTEM AND WAVELET TRANSFORM

Volume 10, Issue 1, March 2017, Pages 81-91
Abbas Salman Hameed

First Page Previous Page 1 2 Next Page Last Page


Journal Management System. Powered by ejournalplus.com