-
1
-
-
84859969075
-
Implementation stage for high securing cover-file of hidden data using computation between cryptography and steganography
-
Session 6
-
Zaidan, A.A., B.B. Zaidan, M.M. Abdulrazzaq, R.Z. Raji and S.M. Mohammed, 2009. Implementation stage for high securing cover-file of hidden data using computation between cryptography and steganography. Int. Assoc. Comput. Sci. Inform. Technol., 20, Session 6, p.p 482-489.. http://WWW.IACSIT.ORG andWww.WordAcademicPress.com
-
(2009)
Int. Assoc. Comput. Sci. Inform. Technol.
, vol.20
, pp. 482-489
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Abdulrazzaq, M.M.3
Raji, R.Z.4
Mohammed, S.M.5
-
2
-
-
35048817029
-
Hydan: Hiding information in program binaries
-
Oct. 27-29, Springer Berlin, Heidelberg
-
El-Khalil, R. and A.D. Keromytis, 2004. Hydan: Hiding information in program binaries. Proceedings of the 6th International Conference on Information and Communications Security, Oct. 27-29, Springer Berlin, Heidelberg, pp: 187-199. http://cat.inist.fr/?aModele=afficheN&cpsidt=16334236
-
(2004)
Proceedings of the 6th International Conference on Information and Communications Security
, pp. 187-199
-
-
El-Khalil, R.1
Keromytis, A.D.2
-
3
-
-
24944519882
-
Steganography for executable and code transformation signatures
-
May 24, Springer Berlin, Heidelberg
-
Anckaert, B.B. De Sutter, D. Chanet and K. De Bosschere, 2005. Steganography for executable and code transformation signatures. Proceedings of the 7th Information Security and Cryptology, May 24, Springer Berlin, Heidelberg, pp: 425-439. http://www.springerlink.com/content/vbxjdapj9g25agel/
-
(2005)
Proceedings of the 7th Information Security and Cryptology
, pp. 425-439
-
-
Anckaert, B.B.1
De Sutter, D.C.2
De Bosschere, K.3
-
4
-
-
70449563262
-
Novel approach of hidden data in the unused area 1 within exe files using computation between cryptography and steganography
-
June 24-26, Academic and Scientific Research Organizations, Paris, France
-
Zaidan, B.B., Zaidan. A.A, F. Othman and A. Rahem, 2009. Novel approach of hidden data in the unused area 1 within exe files using computation between cryptography and steganography. Proceeding of the International Conference on Cryptography, Coding and Information Security, June 24-26, Academic and Scientific Research Organizations, Paris, France, pp: 1-22. http://www.waset.org/programs/Paris09.pdf
-
(2009)
Proceeding of the International Conference on Cryptography, Coding and Information Security
, pp. 1-22
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Othman, F.3
Rahem, A.4
-
5
-
-
77952266986
-
Novel approach of hidden data in the unused area 2 within exe file using computation between cryptography and steganography
-
Naji, A.W., Zaidan.A.A. Zaidan.B.B. A. Shihab and O.O. Khalifa, 2009. Novel approach of hidden data in the unused area 2 within exe file using computation between cryptography and steganography. Int. J. Comput. Sci. Network Secur., 9: 294-300. http://paper.ijcsns.org/07_book/200905/20090539.pdf
-
(2009)
Int. J. Comput. Sci. Network Secur.
, vol.9
, pp. 294-300
-
-
Naji, A.W.1
Zaidan, A.A.2
Shihab Zaidan, B.B.A.3
Khalifa, O.O.4
-
6
-
-
77952263896
-
-
Muhamadi, I.A.S., Zaidan .M.A., Zaidan A.A and Zaidan. B.B, 2009. Student record retrieval system using knowledge sharing. Int. J. Comput. Sci. Network Secur., 9: 97-106. http://paper.ijcsns.org/07_book/200906/20090614.pdf
-
(2009)
Int. J. Comput. Sci. Network Secur.
, vol.9
, pp. 97-106
-
-
Muhamadi, I.A.S.1
Zaidan, M.A.2
Zaidan, A.A.3
Zaidan B.B4
|