Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Rana Saad Mohammed"'
Autor:
Rana Saad Mohammed, Eman L. Mohaisen
Publikováno v:
rana saad mohammed
The efficiency of a stream cipher is an important property that measures its robustness against the attacks and analysis. The robustness of the stream cipher based on the complexity of the generated keystream that is used to secure text and images vi
Publikováno v:
rana saad mohammed
The cloud computing providing to users and companies many services and facilities such as less cost, availability and risk management. The services of cloud computing are delivered in pay per usage way and on-demand and it can store huge amount of da
Publikováno v:
International Journal of Electrical and Computer Engineering (IJECE). 11:3070
Image encryption has become an important application aspect of information security. Most attempts are focused on increasing the security aspect, the quality of the resulting image, and the time consumed. On the other hand, dealing with the color ima
Autor:
Rana Saad Mohammed, Eman L. Mohaisen
Publikováno v:
rana saad mohammed
Information Security has still the aim of many agencies and organisations. They have great attention to cryptosystems to ensure the security of their information. So, scientists and researchers had proposed many cryptosystems and improve their perfor
Publikováno v:
rana saad mohammed
Internet of things becomes important and its applications have widely used in the last years. These applications need a protection system against different attacks. This paper study the recent IoT Security researches and classifies them into the foll
Publikováno v:
International Journal of Signal Processing, Image Processing and Pattern Recognition. 9:91-102
Autor:
Sattar B. Sadkhan, Rana Saad Mohammed
Publikováno v:
Shaping the Future of ICT
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d99ddfd1f6a81d47425992530d09164c
https://doi.org/10.1201/9781315155241-22
https://doi.org/10.1201/9781315155241-22
Publikováno v:
2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).
In recent years, encryption technology has been developed quickly and many image encryption methods have been put forward. This paper presents a technique of image encryption based on image clustering as preprocessing. Permutation and substitution pr
Autor:
Sattar B. Sadkhan, Rana Saad Mohammed
Publikováno v:
2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).
Cryptography techniques must develop with the developing of wireless communication technologies. One of recent research is chaos based cryptography. Since there is data redundant in chaos signal, and not all chaos maps are random, also the attacker c
Publikováno v:
2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA).
Privacy Preserving Association Rule Mining (PPAM) becomes an important issue in recent years. Since data mining alone is not enough to share data between companies without privacy preserving. In this paper, a new technique has been proposed to mainta