Zobrazeno 1 - 10
of 23
pro vyhledávání: '"mahmood khalel"'
Autor:
Rania M. Habash, mahmood khalel
Publikováno v:
Iraqi Journal of Information & Communication Technology, Vol 6, Iss 2 (2023)
Zero Trust (ZT) is security model and follow the concept of ânever trust, always verifyâ. ZT require to strict identity verification for devise and clients trying to access recourses on private networks regardless of whether they are sitting with
Externí odkaz:
https://doaj.org/article/74359cc5f3f8479eb7993390e8049112
Publikováno v:
Iraqi Journal of Information & Communication Technology, Vol 1, Iss 2 (2018)
the huge development and use of digital multimedia (video, image) over computer networks has led to increase the need for securing of these digital data. Video encryption is widely used as a method for providing security for digital video. In this pa
Externí odkaz:
https://doaj.org/article/c21cce6c42b7461c8d15ed7868693705
Autor:
Mahmood Khalel Ibrahem
Publikováno v:
Iraqi Journal of Information & Communication Technology, Vol 1, Iss 2 (2018)
Shannon defines perfect secrecy for a cryptographic system as such a cryptographic system in which the ciphertext yields no possible information about the plaintext. Diffie and Hellman suggest computationally secure cryptographic systems even if the
Externí odkaz:
https://doaj.org/article/29625259b19d48519a4d57de0585c9c2
Autor:
Mahmood Khalel Ibrahim
Publikováno v:
Engineering and Technology Journal, Vol 30, Iss 3, Pp 443-453 (2012)
Networks and entity groupings requires entity authentication while preserving the privacy of the entity being authenticated. Zero-Knowledge Proof (ZKP) plays an important role in authentication without revealing secret information. Diffie–Hellman (
Externí odkaz:
https://doaj.org/article/3cc7925c2d9e4e04bea9ed03e7a1e02d
Autor:
Mahmood Khalel Ibrahem, Samar Taha m
Publikováno v:
Journal of Kufa for Mathematics and Computer, Vol 1, Iss 5 (2012)
Routing involves two basic activities: determining optimal routing paths and transporting information groups through a network from a source to a destination. Networks routing is considered as a short path problem and optimized within different const
Externí odkaz:
https://doaj.org/article/b80c220ba4ea4d7f878793b0494429bf
Autor:
Abdulrahman, Amer Abdulmajeed1 amer6567@yahoo.com, Ibrahem, Mahmood Khalel2
Publikováno v:
Iraqi Journal of Science. 2021, Vol. 62 Issue 1, p319-328. 10p.
Publikováno v:
Samarra Journal of Pure and Applied Science. 2:132-142
Several Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority
Publikováno v:
Iraqi Journal of Science. :319-328
Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion d
Publikováno v:
Iraqi Journal of Science. :240-248
Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Int
Publikováno v:
Iraqi Journal of Information & Communications Technology. 2:44-57
In constructing a secure and reliable cloud computing environment, a fully homomorphic encryption (FHE) scheme is conceived as a major cryptographic tool, as it enables arbitrary arithmetic evaluation of a cipher text without revealing the plaintext.