-
1
-
-
77954808901
-
Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview
-
Abomhara M, Khalifa OO, Zakaria O, Zaidan AA, Zaidan BB, Alanazi HO (2010). "Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview. " J. Appl. Sci., 10(15): 1656-1661.
-
(2010)
J. Appl. Sci.
, vol.10
, Issue.15
, pp. 1656-1661
-
-
Abomhara, M.1
Khalifa, O.O.2
Zakaria, O.3
Zaidan, A.A.4
Zaidan, B.B.5
Alanazi, H.O.6
-
2
-
-
74349117323
-
A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm
-
Ahmed MA, Kiah MLM, Zaidan BB, Zaidan AA (2010). "A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm. " J. Appl. Sci., 10(1): 59-64.
-
(2010)
J. Appl. Sci.
, vol.10
, Issue.1
, pp. 59-64
-
-
Ahmed, M.A.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
-
3
-
-
78951479954
-
Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study
-
Alam GM, Kiah MLM, Zaidan BB, Zaidan AA, Alanazi HO (2010) "Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. " Sci. Res. Essays, 5(21): 3254-3260.
-
(2010)
Sci. Res. Essays
, vol.5
, Issue.21
, pp. 3254-3260
-
-
Alam, G.M.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
Alanazi, H.O.5
-
4
-
-
78049468900
-
Securing Electronic Medical Records Transmissions over Unsecured Communications: An Overview for Better Medical Governance
-
Alanazi HO, Jalab HA, Alam GM, Zaidan BB, Zaidan AA, (2010a). "Securing Electronic Medical Records Transmissions over Unsecured Communications: An Overview for Better Medical Governance. " J. Med. Plants Res., 4(19): 2059-2074.
-
(2010)
J. Med. Plants Res.
, vol.4
, Issue.19
, pp. 2059-2074
-
-
Alanazi, H.O.1
Jalab, H.A.2
Alam, G.M.3
Zaidan, B.B.4
Zaidan, A.A.5
-
5
-
-
79957461639
-
Secure Topology for Electronic Medical Record Transmissions
-
Alanizi HO, Kiah MLM, Zaidan BB, Zaidan AA, Zaidan Alam GM (2010b). "Secure Topology for Electronic Medical Record Transmissions. " Int. J. Pharmacol., 6(6): 954-958.
-
(2010)
Int. J. Pharmacol.
, vol.6
, Issue.6
, pp. 954-958
-
-
Alanizi, H.O.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
Zaidan Alam, G.M.5
-
6
-
-
43449099742
-
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication
-
Barkan E, Biham E, Keller N (2008). Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. J. Cryptol., 21(3): 392-429.
-
(2008)
J. Cryptol.
, vol.21
, Issue.3
, pp. 392-429
-
-
Barkan, E.1
Biham, E.2
Keller, N.3
-
7
-
-
77749289355
-
Crossed Crypto-scheme in WPA PSK Mode
-
Edinburgh, GB, IEEE CS
-
Balitanas M, Robles RJ, Kim N, Kim T, (2009). "Crossed Crypto-scheme in WPA PSK Mode. " Proceedings of BLISS 2009, Edinburgh, GB, IEEE CS.
-
(2009)
Proceedings of BLISS 2009
-
-
Balitanas, M.1
Robles, R.J.2
Kim, N.3
Kim, T.4
-
8
-
-
66649118184
-
Performance Analysis of Public key Cryptographic Systems RSA and NTRU
-
Challa N, Pradhan J (2007). Performance Analysis of Public key Cryptographic Systems RSA and NTRU. IJCSNS Int. J. Comput. Sci. Netw. Security, 7: 87-96.
-
(2007)
IJCSNS Int. J. Comput. Sci. Netw. Security
, vol.7
, pp. 87-96
-
-
Challa, N.1
Pradhan, J.2
-
9
-
-
34548129922
-
ID-based digital signature scheme on the elliptic curve cryptosystem
-
Chung, YF, Huang KH, Lai F, Chen TS (2007). ID-based digital signature scheme on the elliptic curve cryptosystem. Comput. Standards Interfaces, 29(6): 601-604.
-
(2007)
Comput. Standards Interfaces
, vol.29
, Issue.6
, pp. 601-604
-
-
Chung, Y.F.1
Huang, K.H.2
Lai, F.3
Chen, T.S.4
-
10
-
-
78650601424
-
-
GSM World, Retrieved 2-9-2009, from
-
GSM World (2009a). GSM Security Algorithms. Retrieved 2-9-2009, from http://www.gsmworld.com/our-work/programmesandinitiatives/fraud-and-security/gsm_security_algorithms.htm.
-
(2009)
GSM Security Algorithms
-
-
-
11
-
-
78650624481
-
-
GSM World, Retrieved 2-9-2009, from
-
GSM World (2009b). Market Data Summary (Q2 2009). Retrieved 2-9-2009, from http://www.gsmworld.com/newsroom/marketdata/market_data_summary.htm.
-
(2009)
Market Data Summary (Q2 2009)
-
-
-
13
-
-
55849109155
-
Java based Public Key Infrastructure for SMS Messaging
-
ICTTA'06
-
Hassinen M (2006). Java based Public Key Infrastructure for SMS Messaging. Inf. Commun. Technol., ICTTA'06. 2(1).
-
(2006)
Inf. Commun. Technol.
, vol.2
, Issue.1
-
-
Hassinen, M.1
-
15
-
-
77958064851
-
On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates
-
Hmood AK, Jalab HA, Kasirun ZM, Zaidan AA, Zaidan BB (2010b). "On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. " Int. J. Phys. Sci., 5(7): 1054-1062.
-
(2010)
Int. J. Phys. Sci.
, vol.5
, Issue.7
, pp. 1054-1062
-
-
Hmood, A.K.1
Jalab, H.A.2
Kasirun, Z.M.3
Zaidan, A.A.4
Zaidan, B.B.5
-
19
-
-
79955879550
-
Suitability of SOAP Protocol in Securing Transmissions of EMR Database
-
Nabi MSA, Kiah MLM, Zaidan BB, Zaidan AA, Alam GM (2010). Suitability of SOAP Protocol in Securing Transmissions of EMR Database. Int. J. Pharmacol, 6(6): 959-964.
-
(2010)
Int. J. Pharmacol
, vol.6
, Issue.6
, pp. 959-964
-
-
Nabi, M.S.A.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
Alam, G.M.5
-
20
-
-
79957526790
-
-
Nokia, from, http://www.forum.n okia.com/Tools_Docs_and_Code/deviceComparison.xhtml?dev=%5b N70, N93i, N73,5800_XpressMusic%5d
-
Nokia (2009). Device comparison from http://www.forum.nokia.com/Tools_Docs_and_Code/deviceComparison.xhtml?dev=[N70, N93i, N73,5800_XpressMusic]http://www.forum.nokia.com/Tools_Docs_and_Code/deviceComparison.xhtml?dev=%5b N70, N93i, N73,5800_XpressMusic%5d.
-
(2009)
Device comparison
-
-
-
21
-
-
79957524985
-
-
2009 18-02-2009 [cited 2009 10-06-2009]; Available from
-
NTRUCryptosystems. About us. 2009 18-02-2009 [cited 2009 10-06-2009]; Available from: http://www.ntru.com/about/pr_20090218.htm.
-
NTRUCryptosystems. About us
-
-
-
22
-
-
84857780686
-
Impact of spam advertisement through email: A study to assess the influence of the anti-spam on the email marketing
-
Raad M, Yeasin NM, Alam GM, Zaidan BB, Zaidan AA (2010). "Impact of spam advertisement through email: A study to assess the influence of the anti-spam on the email marketing. " Afr. J. Bus. Manage., 4(11): 2362-2367.
-
(2010)
Afr. J. Bus. Manage.
, vol.4
, Issue.11
, pp. 2362-2367
-
-
Raad, M.1
Yeasin, N.M.2
Alam, G.M.3
Zaidan, B.B.4
Zaidan, A.A.5
-
24
-
-
72449121372
-
Research on NTRU Algorithm for Mobile Java Security Scalable Computing and Communications
-
SCALCOMEMBEDDEDCOM' 09. IEEE Comput. Soc
-
Shen X, Du Z, Chen R (2009). "Research on NTRU Algorithm for Mobile Java Security Scalable Computing and Communications. " Eighth International Conference on Embedded Computing. SCALCOMEMBEDDEDCOM' 09. IEEE Comput. Soc., pp. 366-369.
-
(2009)
Eighth International Conference on Embedded Computing
, pp. 366-369
-
-
Shen, X.1
Du, Z.2
Chen, R.3
-
25
-
-
84876087597
-
Multiplication Based Elliptic Curve Encryption Scheme with Optimized Scalar Multiplication (MECES)
-
Sriram VSS, Dinesh S, Sahoo G (2010). Multiplication Based Elliptic Curve Encryption Scheme with Optimized Scalar Multiplication (MECES). Int. J. Comput. Appl., 1(11): 65-69.
-
(2010)
Int. J. Comput. Appl.
, vol.1
, Issue.11
, pp. 65-69
-
-
Sriram, V.S.S.1
Dinesh, S.2
Sahoo, G.3
-
27
-
-
77950341916
-
Improving e-payment security using Elliptic Curve Cryptosystem
-
Vincent OR, Folorunso O, Akinde AD (2010). Improving e-payment security using Elliptic Curve Cryptosystem. Electron. Commerce Res., 10(1): 27-41.
-
(2010)
Electron. Commerce Res.
, vol.10
, Issue.1
, pp. 27-41
-
-
Vincent, O.R.1
Folorunso, O.2
Akinde, A.D.3
-
28
-
-
74049155937
-
A High Security Framework for SMS
-
Paper presented at the, 2009. BMEI '09. 2nd Int. Conf
-
Wu S, Tan C (2009). A High Security Framework for SMS. Paper presented at the Biomedical Engineering and Informatics, 2009. BMEI '09. 2nd Int. Conf., pp. 1-6.
-
(2009)
Biomedical Engineering and Informatics
, pp. 1-6
-
-
Wu, S.1
Tan, C.2
-
29
-
-
84857781119
-
SSME Architecture Design in Reserving Parking Problems in Malaysia
-
Yass AA, Yaseen NM, Alam GM, Zaidan BB, Zaidan AA (2010). "SSME Architecture Design in Reserving Parking Problems in Malaysia. " Afr. J. Bus. Manage., 4(18): 3911-3923.
-
(2010)
Afr. J. Bus. Manage.
, vol.4
, Issue.18
, pp. 3911-3923
-
-
Yass, A.A.1
Yaseen, N.M.2
Alam, G.M.3
Zaidan, B.B.4
Zaidan, A.A.5
-
30
-
-
33646781971
-
Study on NTRU decryption failures
-
Yu W, He D, Zhu S., (2005). Study on NTRU decryption failures. Inf. Technol. Appl., (2): 454-459.
-
(2005)
Inf. Technol. Appl.
, Issue.2
, pp. 454-459
-
-
Yu, W.1
He, D.2
Zhu, S.3
-
31
-
-
77957325769
-
Novel approach for high (secure and rate) data hidden within triplex space for executable file
-
Zaidan AA, Zaidan BB, Alanazi HO, Gani A, Zakaria O, Alam GM (2010a), "Novel approach for high (secure and rate) data hidden within triplex space for executable file. " Sci. Res. Essays, 5(15): 1965-1977.
-
(2010)
Sci. Res. Essays
, vol.5
, Issue.15
, pp. 1965-1977
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Alanazi, H.O.3
Gani, A.4
Zakaria, O.5
Alam, G.M.6
-
32
-
-
78649273195
-
Novel Multi-Cover Steganography Using Remote Sensing Image and General Recursion Neural Cryptosystem
-
Zaidan AA, Zaidan BB, Taqa AY, Mustafa KMS, Alam GM, Jalab HA (2010b). "Novel Multi-Cover Steganography Using Remote Sensing Image and General Recursion Neural Cryptosystem. " Int. J. Phys. Sci., 5(21): 3254-3260.
-
(2010)
Int. J. Phys. Sci.
, vol.5
, Issue.21
, pp. 3254-3260
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Taqa, A.Y.3
Mustafa, K.M.S.4
Alam, G.M.5
Jalab, H.A.6
-
33
-
-
78649299082
-
StegoMos: A Secure Novel Approach of High Rate Data Hidden Using Mosaic Image and ANN-BMP Cryptosystem
-
Zaidan BB, Zaidan AA, Taqa A, Alam GM, Kiah MLM, Jalab HA (2010c). "StegoMos: A Secure Novel Approach of High Rate Data Hidden Using Mosaic Image and ANN-BMP Cryptosystem. " Int. J. Phys. Sci., 5(11): 1796-1806.
-
(2010)
Int. J. Phys. Sci.
, vol.5
, Issue.11
, pp. 1796-1806
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Taqa, A.3
Alam, G.M.4
Kiah, M.L.M.5
Jalab, H.A.6
-
34
-
-
78651075908
-
A New Hybrid Module for Skin Detector Using Fuzzy Inference System Structure and Explicit Rules
-
Zaidan AA, Karim H, Ahmed NN, Alam GM, Zaidan BB (2010d). A New Hybrid Module for Skin Detector Using Fuzzy Inference System Structure and Explicit Rules. Int. J. Phys. Sci., 5(13): 2084-2097.
-
(2010)
Int. J. Phys. Sci.
, vol.5
, Issue.13
, pp. 2084-2097
-
-
Zaidan, A.A.1
Karim, H.2
Ahmed, N.N.3
Alam, G.M.4
Zaidan, B.B.5
-
35
-
-
78649415172
-
Increase Reliability for Skin Detector Using Backprobgation Neural Network and Heuristic Rules Based on YCbCr
-
Zaidan AA, Ahmed NN, Karim, H. Abdul, Alam GM, Zaidan BB (2010e). Increase Reliability for Skin Detector Using Backprobgation Neural Network and Heuristic Rules Based on YCbCr. Sci. Res. Essays, 5(19): 2931-2946.
-
(2010)
Sci. Res. Essays
, vol.5
, Issue.19
, pp. 2931-2946
-
-
Zaidan, A.A.1
Ahmed, N.N.2
Karim, H.A.3
Alam, G.M.4
Zaidan, B.B.5
-
36
-
-
78751500455
-
A Novel Hybrid Module of Skin Detector Using Grouping Histogram Technique for Bayesian Method and Segment Skin Adjacent-Nested Technique for Neural Network
-
(In press)
-
Zaidan AA, Karim H, Ahmed NN, Alam GM, Zaidan BB (2010f). A Novel Hybrid Module of Skin Detector Using Grouping Histogram Technique for Bayesian Method and Segment Skin Adjacent-Nested Technique for Neural Network. Int. J. Phys. Sci., 5(14) (In press).
-
(2010)
Int. J. Phys. Sci.
, vol.5
, Issue.14
-
-
Zaidan, A.A.1
Karim, H.2
Ahmed, N.N.3
Alam, G.M.4
Zaidan, B.B.5
-
37
-
-
78751509177
-
Spam Influence on the Business and Economy: Theoretical and Experimental Study for Textual Anti-spam Filtering Using Mature Document Processing and Naïve Bayesian Classifier
-
Zaidan AA, Ahmed NN, Karim H, Alam GM, Zaidan BB (2010g). "Spam Influence on the Business and Economy: Theoretical and Experimental Study for Textual Anti-spam Filtering Using Mature Document Processing and Naïve Bayesian Classifier. " Afr. J. Bus. Manage., 5.
-
(2010)
Afr. J. Bus. Manage.
, pp. 5
-
-
Zaidan, A.A.1
Ahmed, N.N.2
Karim, H.3
Alam, G.M.4
Zaidan, B.B.5
-
38
-
-
51249092200
-
Building Secure User-to-user Messaging in Mobile Telecommunication Networks
-
WTS 2008
-
Zhao S, Aggarwal A, Liu S (2008). Building Secure User-to-user Messaging in Mobile Telecommunication Networks. WirelessTelecommun. Symp., WTS 2008: 151-157.
-
(2008)
WirelessTelecommun. Symp.
, pp. 151-157
-
-
Zhao, S.1
Aggarwal, A.2
Liu, S.3
|