-
1
-
-
77954808901
-
Overview: Suitability of using symmetric key to secure multimedia data
-
Abomhara, M., O. Zakaria, O.O. Khalifa, A.A. Zaidan, B.B. Zaidan and O.A. Hamdan, 2010. Overview: Suitability of using symmetric key to secure multimedia data. J. Applied Sci., 10: 1656-1661.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 1656-1661
-
-
Abomhara, M.1
Zakaria, O.2
Khalifa, O.O.3
Zaidan, A.A.4
Zaidan, B.B.5
Hamdan, O.A.6
-
2
-
-
77954783799
-
New framework for high secure data hidden in the MPEG using AES encryption algorithm
-
Alaa, T., A.A. Zaidan and B.B. Zaidan, 2009. New framework for high secure data hidden in the MPEG using AES encryption algorithm. Int. J. Comput. Electr. Eng., 1: 566-571.
-
(2009)
Int. J. Comput. Electr. Eng.
, vol.1
, pp. 566-571
-
-
Alaa, T.1
Zaidan, A.A.2
Zaidan, B.B.3
-
3
-
-
77954802088
-
New comparative study between DES, 3DES and AES within nine factors
-
Alanazi, H.O., B.B Zaidan, A.A. Zaidan, A.H. Jalab, M. Shabbir and Y. Al-Nabhani, 2010. New comparative study between DES, 3DES and AES within nine factors. J. Comput, 2: 152-157.
-
(2010)
J. Comput
, vol.2
, pp. 152-157
-
-
Alanazi, H.O.1
Zaidan, B.B.2
Zaidan, A.A.3
Jalab, A.H.4
Shabbir, M.5
Al-Nabhani, Y.6
-
4
-
-
77958532276
-
Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard
-
Naji, A.W., A.A. Zaidan, B.B. Zaidan and I.A.S. Muhamadi, 2009a. Novel approach for cover file of hidden data in the unused area two within EXE file using distortion techniques and advance encryption standard. Proc. World Acad. Sci. Eng. Technol, 56: 498-502.
-
(2009)
Proc. World Acad. Sci. Eng. Technol.
, vol.56
, pp. 498-502
-
-
Naji, A.W.1
Zaidan, A.A.2
Zaidan, B.B.3
Muhamadi, I.A.S.4
-
5
-
-
77952268534
-
Challenges of hidden data in the unused area two within executable files
-
Naji, A.W., A.A. Zaidan and B.B. Zaidan, 2009b. Challenges of hidden data in the unused area two within executable files. J. Comput. Sci., 5: 890-897.
-
(2009)
J. Comput. Sci.
, vol.5
, pp. 890-897
-
-
Naji, A.W.1
Zaidan, A.A.2
Zaidan, B.B.3
-
6
-
-
77954769007
-
Theory and implementation of data encryption standard:
-
Rabah, K., 2005a. Theory and implementation of data encryption standard: A review. Inform. Technol. J.,4: 307-325.
-
(2005)
A Review. Inform. Technol. J.
, vol.4
, pp. 307-325
-
-
Rabah, K.1
-
7
-
-
33644596644
-
Theory and implementation of elliptic curve cryptography
-
Rabah, K., 2005b. Theory and implementation of elliptic curve cryptography. J. Applied Sci., 5: 604-633.
-
(2005)
J. Applied Sci.
, vol.5
, pp. 604-633
-
-
Rabah, K.1
-
8
-
-
33646264791
-
Implementing secure RSA cryptosystems using your own cryptographic JCE provider
-
Rabah, K., 2006. Implementing secure RSA cryptosystems using your own cryptographic JCE provider. J. Applied Sci., 6: 482-510.
-
(2006)
J. Applied Sci.
, vol.6
, pp. 482-510
-
-
Rabah, K.1
-
9
-
-
84888281099
-
Theoretical Analysis of linear cryptanalysis against DES (Data Encryption Standard)
-
Xu, Q.Z. and Y. Dereje, 2004. Theoretical Analysis of linear cryptanalysis against DES (Data Encryption Standard). Inform. Technol. J., 3: 49-56.
-
(2004)
Inform. Technol. J.
, vol.3
, pp. 49-56
-
-
Xu, Q.Z.1
Dereje, Y.2
-
10
-
-
84888281933
-
High securing cover-file of hidden data using statistical technique and AES encryption algorithm
-
Zaidan, A.A., B.B. Zaidan and M. Anas, 2009a. High securing cover-file of hidden data using statistical technique and AES encryption algorithm. World Acad. Sci. Eng. Technol., 54: 468-479.
-
(2009)
World Acad. Sci. Eng. Technol.
, vol.54
, pp. 468-479
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Anas, M.3
-
11
-
-
70449563262
-
Novel approach of hidden data in the unused area 1 within exe files using computation between cryptography and steganography
-
June 24-26, Academic and Scientific Research Organizations, Paris, France
-
Zaidan, B.B., A.A. Zaidan, F. Othman and A. Rahem, 2009b. Novel approach of hidden data in the unused area 1 within exe files using computation between cryptography and steganography. Proceedings of the International Conference on Cryptography Coding and Information Security, June 24-26, Academic and Scientific Research Organizations, Paris, France, pp: 1-22.
-
(2009)
Proceedings of the International Conference on Cryptography Coding and Information Security
, pp. 1-22
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Othman, F.3
Rahem, A.4
-
12
-
-
84888276035
-
A new system for hiding data within (Unused Area Two + Image Page) of portable executable file using statistical technique and advance encryption standard
-
Zaidan, A.A., B.B. Zaidan and A.H. Jalab, 2010a. A new system for hiding data within (Unused Area Two + Image Page) of portable executable file using statistical technique and advance encryption standard. Int. J. Comput. Theory Eng., 2: 220-227.
-
(2010)
Int. J. Comput. Theory Eng.
, vol.2
, pp. 220-227
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Jalab, A.H.3
-
13
-
-
77954783981
-
On the differences between hiding information and cryptography techniques: An overview
-
Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010b. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 1650-1655
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Al-Frajat, A.K.3
Jalab, H.A.4
|