-
2
-
-
77954793527
-
Enhancing selective encryption for H.264/AVC using advance encryption standard
-
Abomhara, M., O. Zakaria, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2010b. Enhancing selective encryption for H.264/AVC using advance encryption standard. Int. J. Comput. Electr. Eng., 2: 223-229.
-
(2010)
Int. J. Comput. Electr. Eng.
, vol.2
, pp. 223-229
-
-
Abomhara, M.1
Zakaria, O.2
Khalifa, O.O.3
Zaidan, A.A.4
Zaidan, B.B.5
-
3
-
-
77954783799
-
New framework for high secure data hidden in the MPEG using AES encryption algorithm
-
Alaa, T., A.A. Zaidan and B.B. Zaidan, 2009. New framework for high secure data hidden in the MPEG using AES encryption algorithm. Int. J. Comput. Electr. Eng., 1: 566-571.
-
(2009)
Int. J. Comput. Electr. Eng.
, vol.1
, pp. 566-571
-
-
Alaa, T.1
Zaidan, A.A.2
Zaidan, B.B.3
-
4
-
-
77954799905
-
New frame work of hidden data with in non multimedia file
-
Alanazi, H.O., A.H. Jalab, A.A. Zaidan and B.B. Zaidan, 2010a. New frame work of hidden data with in non multimedia file. Int. J. Comput. Network Security, 2: 46-54.
-
(2010)
Int. J. Comput. Network Security
, vol.2
, pp. 46-54
-
-
Alanazi, H.O.1
Jalab, A.H.2
Zaidan, A.A.3
Zaidan, B.B.4
-
5
-
-
77954802088
-
New comparative study between DES, 3DES and AES within nine factors
-
Alanazi, H.O., B.B Zaidan, A.A. Zaidan, A.H. Jalab, M. Shabbir and Y. Al-Nabhani, 2010b. New comparative study between DES, 3DES and AES within nine factors. J. Comput., 2: 152-157.
-
(2010)
J. Comput.
, vol.2
, pp. 152-157
-
-
Alanazi, H.O.1
Zaidan, B.B.2
Zaidan, A.A.3
Jalab, A.H.4
Shabbir, M.5
Al-Nabhani, Y.6
-
8
-
-
84915280624
-
Cryptology goes public
-
Magazine
-
Kahn, D., 1980. Cryptology goes public. IEEE Commnn. Magazine, 4: 19-28.
-
(1980)
IEEE Commnn.
, vol.4
, pp. 19-28
-
-
Kahn, D.1
-
9
-
-
77954768373
-
-
Retrieved from (accessed, 20 DES, 2009)
-
Kessler, G.C., 1998. An overview of cryptography. Retrieved from (accessed, 20 DES, 2009). http://www.garykessler.net/library/crypto.html#intro.
-
(1998)
An Overview of Cryptography
-
-
Kessler, G.C.1
-
10
-
-
29044449735
-
Communications Cryptography
-
Oct. 5-6, Subang, Selangor, Malaysia
-
Khalifa, O.O., M.D. Rafiqul Islam, S. Khan and M.S. Shebani, 2004. Communications cryptography. Proceedings of the RF and Microwaves Conference RFM2004, Oct. 5-6, Subang, Selangor, Malaysia, pp: 220-223.
-
(2004)
Proceedings of the RF and Microwaves Conference RFM2004
, pp. 220-223
-
-
Khalifa, O.O.1
Rafiqul Islam, M.D.2
Khan, S.3
Shebani, M.S.4
-
11
-
-
77952268534
-
Challenges of hidden data in the unused area two within executable files
-
Naji, A.W., A.A. Zaidan and B.B. Zaidan, 2009a. Challenges of hidden data in the unused area two within executable files. J. Comput. Sci., 5: 890-897.
-
(2009)
J. Comput. Sci.
, vol.5
, pp. 890-897
-
-
Naji, A.W.1
Zaidan, A.A.2
Zaidan, B.B.3
-
12
-
-
77952266986
-
Novel approach of hidden data in the (unused area 2 within exe file) using computation between cryptography and steganography
-
Naji, A.W., A.A. Zaidan, B.B. Zaidan, A. Shihab and O.O. Khalifa, 2009b. Novel approach of hidden data in the (unused area 2 within exe file) using computation between cryptography and steganography. Int. J. Comput. Sci. Network Security, 9: 294-300.
-
(2009)
Int. J. Comput. Sci. Network Security
, vol.9
, pp. 294-300
-
-
Naji, A.W.1
Zaidan, A.A.2
Zaidan, B.B.3
Shihab, A.4
Khalifa, O.O.5
-
13
-
-
77954769007
-
Theory and implementation of data encryption standard: A Review
-
Rabah, K., 2005a. Theory and implementation of data encryption standard: A review. Inform. Technol. J., 4: 307-325.
-
(2005)
Inform. Technol. J.
, vol.4
, pp. 307-325
-
-
Rabah, K.1
-
14
-
-
33644596644
-
Theory and implementation of elliptic curve cryptography
-
Rabah, K., 2005b. Theory and implementation of elliptic curve cryptography. J. Applied Sci., 5: 604-633.
-
(2005)
J. Applied Sci.
, vol.5
, pp. 604-633
-
-
Rabah, K.1
-
15
-
-
33646264791
-
Implementing secure RSA cryptosystems using your own cryptographic JCE provider
-
Rabah, K., 2006. Implementing secure RSA cryptosystems using your own cryptographic JCE provider. J. Applied Sci., 6: 482-510.
-
(2006)
J. Applied Sci.
, vol.6
, pp. 482-510
-
-
Rabah, K.1
-
17
-
-
84888281099
-
Theoretical Analysis of linear cryptanalysis against DES (Data Encryption Standared)
-
Xu, Q.Z. and Y. Dereje, 2004. Theoretical Analysis of linear cryptanalysis against DES (Data Encryption Standared). Inform. Technol. J., 3: 49-56.
-
(2004)
Inform. Technol. J.
, vol.3
, pp. 49-56
-
-
Xu, Q.Z.1
Dereje, Y.2
-
18
-
-
84888281933
-
High securing cover-file of hidden data using statistical technique and AES encryption algorithm
-
Zaidan, A.A., B.B. Zaidan and M. Anas, 2009a. High securing cover-file of hidden data using statistical technique and AES encryption algorithm. World Acad. Sci. Eng. Technol, 54: 468-479.
-
(2009)
World Acad. Sci. Eng. Technol
, vol.54
, pp. 468-479
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Anas, M.3
-
19
-
-
85015378969
-
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
-
Zaidan, A.A., F. Othman, B.B. Zaidan, R.Z. Raji, H.K. Ahmed and A.W. Naji, 2009b. Securing cover-file without limitation of hidden data size using computation between cryptography and steganography. Proc. World Cong. Eng., 1: 259-265.
-
(2009)
Proc. World Cong. Eng.
, vol.1
, pp. 259-265
-
-
Zaidan, A.A.1
Othman, F.2
Zaidan, B.B.3
Raji, R.Z.4
Ahmed, H.K.5
Naji, A.W.6
-
20
-
-
84888276035
-
A new system for hiding data within (Unused Area Two + Image Page) of portable executable file using statistical technique and advance encryption standard
-
Zaidan, A.A., B.B. Zaidan, A.H. Jalab, 2010. A new system for hiding data within (Unused Area Two + Image Page) of portable executable file using statistical technique and advance encryption standard. Int. J. Comput. Theory Eng., 2: 220-227.
-
(2010)
Int. J. Comput. Theory Eng.
, vol.2
, pp. 220-227
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Jalab, A.H.3
|