skip to main content
Resultados 1 2 3 next page
Mostrar Somente
Refinado por: idioma: Árabe remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
COMPARATIVE STUDY OF CHAOTIC SYSTEM FOR ENCRYPTION
Material Type:
Artigo
Adicionar ao Meu Espaço

COMPARATIVE STUDY OF CHAOTIC SYSTEM FOR ENCRYPTION

S. Salman, Doaa ; Rokan Naif, Jolan

Iraqi journal for computers and informatics (Online), 2023-12, Vol.49 (2), p.83-92 [Periódico revisado por pares]

University of Information Technology and Communications

Texto completo disponível

2
Cloud Data Storage Confidentiality Using Steganography and Visual Cryptography: A Review
Material Type:
Artigo
Adicionar ao Meu Espaço

Cloud Data Storage Confidentiality Using Steganography and Visual Cryptography: A Review

Hameed, Asmaa ; Karan, Ogr. Uye. Oquz

Journal of Education and Science, 2023-12, Vol.32 (4), p.60-70 [Periódico revisado por pares]

College of Education for Pure Sciences

Texto completo disponível

3
A Method for Randomly Hiding Secret Encrypted Data in Images using Cellular Automata
Material Type:
Artigo
Adicionar ao Meu Espaço

A Method for Randomly Hiding Secret Encrypted Data in Images using Cellular Automata

Abdulmajeed, Ansam ; Abdullatif, Fatima ; Mustafa, Wafaa

AL-Rafidain journal of computer sciences and mathematics, 2019-06, Vol.13 (1), p.28-36 [Periódico revisado por pares]

Mosul University

Texto completo disponível

4
The semiology of protest art and encrypted technology techniques As a Visual Representation of The Era of Confluence Art with Cryptography An analytical study
Material Type:
Artigo
Adicionar ao Meu Espaço

The semiology of protest art and encrypted technology techniques As a Visual Representation of The Era of Confluence Art with Cryptography An analytical study

Sozan Abd el Wahed Mohamed

Majallat al-ʻimārah wa-al-funūn wa-al-ʻulūm al-insānīyah, 2022-01, Vol.7 (31), p.377-407 [Periódico revisado por pares]

Arab Association for Islamic Civilization and Art

Texto completo disponível

5
Hiding Encryption Text by DNA using Exploiting Modification Direction Algorithm
Material Type:
Artigo
Adicionar ao Meu Espaço

Hiding Encryption Text by DNA using Exploiting Modification Direction Algorithm

Hashim, Mohammad ; saeed, Melad

AL-Rafidain journal of computer sciences and mathematics, 2021-06, Vol.15 (1), p.147-158 [Periódico revisado por pares]

Mosul University

Texto completo disponível

6
Enhance the Hiding Image by Using Compression and Securing Techniques
Material Type:
Artigo
Adicionar ao Meu Espaço

Enhance the Hiding Image by Using Compression and Securing Techniques

Farhan, Ahmed S. ; Awad, Fouad H. ; Saad, Saif

Iraqi journal for computers and informatics (Online), 2017-06, Vol.43 (1), p.14-16 [Periódico revisado por pares]

University of Information Technology and Communications

Texto completo disponível

7
Encryption of Stereo Images after Compression by Advanced Encryption Standard (AES)
Material Type:
Artigo
Adicionar ao Meu Espaço

Encryption of Stereo Images after Compression by Advanced Encryption Standard (AES)

Hussien, Marwah k

Al-Mustansiriyah journal of science, 2018-04, Vol.28 (2), p.156-161 [Periódico revisado por pares]

Al-Mustansiriyah University

Texto completo disponível

8
Enhance the Hiding Image by Using Compression and Securing Techniques
Material Type:
Artigo
Adicionar ao Meu Espaço

Enhance the Hiding Image by Using Compression and Securing Techniques

Farhan, Ahmed ; Awad, Fouad ; Saad, Saif

Iraqi journal for computers and informatics (Online), 2017-06, Vol.43 (1), p.14-16 [Periódico revisado por pares]

University of Information Technology and Communications

Texto completo disponível

9
Proposed Approach for Improving RNA Crypto-Key Based on Polynomial Convolution
Material Type:
Artigo
Adicionar ao Meu Espaço

Proposed Approach for Improving RNA Crypto-Key Based on Polynomial Convolution

Estabraq Abdulredaa KadhimInstructor

Iraqi journal for computers and informatics (Online), 2018-11, Vol.44 (1) [Periódico revisado por pares]

University of Information Technology and Communications

Texto completo disponível

10
Higher Level Security Approach for Data Communication System Based on AES Cryptography and DWT Steganography
Material Type:
Artigo
Adicionar ao Meu Espaço

Higher Level Security Approach for Data Communication System Based on AES Cryptography and DWT Steganography

Saraireh, Saja ; Matarneh, Aser

Jordanian Journal of Computers and Information Technology, 2016-12, Vol.2 (3), p.179-193 [Periódico revisado por pares]

Amman: Scientific Research Support Fund of Jordan Princess Sumaya University for Technology

Texto completo disponível

Resultados 1 2 3 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Revistas revisadas por pares (20)

Refinar Meus Resultados

Tipo de Recurso 

  1. Artigos  (25)
  2. Anais de Congresso  (1)
  3. Mais opções open sub menu

Data de Publicação 

De até
  1. Antes de2009  (3)
  2. 2009Até2015  (5)
  3. 2016Até2018  (8)
  4. 2019Até2022  (8)
  5. Após 2022  (3)
  6. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.