Browse Title Index


 
Issue Title
 
Vol 29, No 2: February 2023 Secure fragile watermarking based on Huffman encoding and optimal embedding strategy Abstract   PDF
Mourad Zairi, Tarik Boujiha, Abdelhaq Ouelli
 
Vol 28, No 2: November 2022 Secure hybrid fiber optic and free optical space communication systems Abstract   PDF
Arwa A. Moosa, Malik A. Alsaedi, Hussein Jumma Jabir, Mays Afif Anaee
 
Vol 21, No 3: March 2021 Secure image hiding in speech signal by steganography-mining and encryption Abstract   PDF
Amal Hameed Khaleel, Iman Qays Abduljaleel
 
Vol 28, No 1: October 2022 Secure smart home automation and monitoring system using internet of things Abstract   PDF
Mohamed Khudhair Al-Gburi, Laith Ali Abdul-Rahaim
 
Vol 19, No 1: July 2020 Secure vehicle to vehicle voice chat based MQTT and CoAP internet of things protocol Abstract   PDF
Noor A. Hussein, Mohamed Ibrahim. Shujaa
 
Vol 15, No 3: September 2015 Secured Communication Among HMI and Controller using RC-4 Algorithmand Raspberry Pi Abstract   PDF
Albert Sagala, Deni Parlindungan Lumbantoruan, Epelin Manurung, Iroma Situmorang, Adi Gunawan
 
Vol 29, No 2: February 2023 Secured drone communication based on Esalsa20 algorithm and 1d logistic map Abstract   PDF
Ibtesam Jomaa, Worud Mahdi Saleh, Rasha Rokan Ismail Hassan, Saja Huzber Hussien Wadi
 
Vol 23, No 1: July 2021 Secured protection of transmission line by distance relay using data mining approach Abstract   PDF
M. Kiruthika, Bindu S.
 
Vol 16, No 2: November 2015 SecureDBaaS Model for Accessing Encrypted Cloud Databases Abstract   PDF
Palle Jagadeeswaraiah, M.R. Pavan Kumar
 
Vol 22, No 3: June 2021 Securing audio transmission based on encoding and steganography Abstract   PDF
Enas Wahab Abood, Zaid Ameen Abduljabbar, Mustafa A. Al Sibahee, Mohammed Abdulridha Hussain, Zaid Alaa Hussien
 
Vol 10, No 2: May 2018 Securing Data Communication for Data Driven Applications Using End to End Encryption Abstract   PDF
Subhi Almohtasib, Alaa H Al-Hamami
 
Vol 28, No 3: December 2022 Securing data using deep hiding selected least significant bit and adaptive swarm algorithm Abstract   PDF
Bashar Izzeddin Issa Aljidi, Sundresan Perumal, Sakinah Ali Pitchay
 
Vol 11, No 4: April 2013 Securing Personal Health Records in the Cloud by Enforcing Sticky Policies Abstract   PDF
Chunxia Leng, Huiqun Yu, Jingming Wang, Jianhua Huang
 
Vol 13, No 1: January 2019 Securing SAAS service under cloud computing based multi-tenancy systems Abstract   PDF
Trinathbasu Miriyala, JKR Sastry
 
Vol 22, No 1: April 2021 Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device Abstract   PDF
Seniman Seniman, Baihaqi Siregar, Rani Masyithah Pelle, Fahmi Fahmi
 
Vol 18, No 2: May 2020 Securing speech signals by watermarking binary images in the wavelet domain Abstract   PDF
Rakan Saadallah Rashid, Jafar Ramadhan Mohammed
 
Vol 26, No 2: May 2022 Security approach for instant messaging applications: viber as a case study Abstract   PDF
Mohammed Falih Kadhim, Adel Al-Janabi, Ahmed Hazim Alhilali, Nabeel Salih Ali
 
Vol 16, No 2: November 2019 Security assessment of four open source software systems Abstract   PDF
Faraz Idris Khan, Yasir Javed, Mamdouh Alenezi
 
Vol 11, No 1: July 2018 Security Authentication for Student Cards’ Biometric Recognition Using Viola-Jones Algorithm Abstract   PDF
S. Ibrahim, K.R. Jamaluddin, K.A.F.A. Samah
 
Vol 33, No 2: February 2024 Security enhancement of cyber-physical system using modified encryption AESGNRSA technique Abstract   PDF
Kundankumar Rameshwar Saraf, P. Malathi
 
Vol 12, No 6: June 2014 Security Evaluation for RFID System: Security Evaluation Index Architecture and Evaluation Model Abstract   PDF
Hengfeng Luo, Ruiqi Liu, Yingkai Wang, Jinghao Chen
 
Vol 15, No 2: August 2015 Security for Mobile Agents: Trust Estimate for Platforms Abstract   PDF
Razouki Hassan, Hair Abdellatif
 
Vol 6, No 2: May 2017 Security for Virtualization in Cloud Services using Duplication Method Abstract   PDF
N.L. Udaya Kumar, M. Siddappa
 
Vol 15, No 3: September 2015 Security in Wireless sensor network: Approaches and Issues Abstract   PDF
Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal, Kashif Naseer Qureshi
 
Vol 12, No 4: April 2014 Security Interaction of Web Services in Heterogeneous Platforms Abstract   PDF
Tao Xu, Xin Hu, Jiwen Xie, Shujuan Sun
 
6626 - 6650 of 7955 Items << < 261 262 263 264 265 266 267 268 269 270 > >>