-
1
-
-
77954808901
-
Overview: Suitability of using symmetric key to secure multimedia data
-
Abomhara, M., O. Zakaria, O.O. Khalifa, AA. Zaidan, B.B. Zaidan and OA. Hamdan, 2010. Overview: Suitability of using symmetric key to secure multimedia data. J. Applied Sci., 10: 1656-1661.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 1656-1661
-
-
Abomhara, M.1
Zakaria, O.2
Khalifa, O.O.3
Zaidan, A.A.4
Zaidan, B.B.5
Hamdan, O.A.6
-
2
-
-
78049301707
-
Evaluating the vulnerability and the security of public organizations websites in Jordan
-
Abu Ali, A.N., A.K. Alnaimat and H.Y. Abu-Addose, 2010. Evaluating the vulnerability and the security of public organizations websites in Jordan. J. Applied Sci., 10: 2447-2453.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 2447-2453
-
-
Abu Ali, A.N.1
Alnaimat, A.K.2
Abu-Addose, H.Y.3
-
3
-
-
74349117323
-
A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
-
Ahmed, M.A., M.L.M. Kiah, B.B. Zaidan and A.A. Zaidan, 2010. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Applied Sci., 10: 59-64.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 59-64
-
-
Ahmed, M.A.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
-
4
-
-
77649155870
-
Arabic text steganography using kashida extensions with huffman code
-
Al-Azawi, A.F. and MA. Fadhil, 2010. Arabic text steganography using kashida extensions with huffman code. J. Applied Sci., 10: 436-439.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 436-439
-
-
Al-Azawi, A.F.1
Fadhil, M.A.2
-
5
-
-
78951479954
-
Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study
-
Alain, G.M., M.L.M. Kiah, B.B. Zaidan, AA. Zaidan and H.O. Alanazi, 2010. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Sci. Res. Essays, 5: 3254-3260.
-
(2010)
Sci. Res. Essays.
, vol.5
, pp. 3254-3260
-
-
Alain, G.M.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
Alanazi, H.O.5
-
6
-
-
79957461639
-
Secure topology for electronic medical record transmissions
-
Alanazi, H.O., M.L.M. Kiah, AA. Zaidan, B.B. Zaidan and G.M. Alam, 2010a. Secure topology for electronic medical record transmissions. Int. J. Pharmacol., 6: 954-958.
-
(2010)
Int. J. Pharmacol.
, vol.6
, pp. 954-958
-
-
Alanazi, H.O.1
Kiah, M.L.M.2
Zaidan, A.A.3
Zaidan, B.B.4
Alam, G.M.5
-
7
-
-
78049468900
-
Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance
-
Alanazi, H.O., HA. Jalab, G.M. Alam, B.B. Zaidan and A.A. Zaidan, 2010b. Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance. J. Med. Plants Res., 4: 2059-2074.
-
(2010)
J. Med. Plants Res.
, vol.4
, pp. 2059-2074
-
-
Alanazi, H.O.1
Jalab, H.A.2
Alam, G.M.3
Zaidan, B.B.4
Zaidan, A.A.5
-
8
-
-
77649295235
-
A study of neural network and its properties of training and adaptability in enhancing accuracy in a multimodal biometrics scenario
-
Alsaade, F., 2010. A study of neural network and its properties of training and adaptability in enhancing accuracy in a multimodal biometrics scenario. Inform. Technol. J., 9: 188-191.
-
(2010)
Inform. Technol. J.
, vol.9
, pp. 188-191
-
-
Alsaade, F.1
-
10
-
-
75949107726
-
A novel hybrid protection technique of privacy-preserving data mining and anti-data mining
-
Chen, T.S., J. Chen and Y.H. Kao, 2010. A novel hybrid protection technique of privacy-preserving data mining and anti-data mining. Inform. Technol. J., 9: 500-505.
-
(2010)
Inform. Technol. J.
, vol.9
, pp. 500-505
-
-
Chen, T.S.1
Chen, J.2
Kao, Y.H.3
-
11
-
-
79953076040
-
How strong are passwords used to protect personal health information in clinical trials
-
El-Emam, K, K. Moreau and E. Jonker, 2011. How strong are passwords used to protect personal health information in clinical trials. J. Med. Internet Res., 13: el8-el8.
-
(2011)
J. Med. Internet Res.
, vol.13
-
-
El-Emam, K.1
Moreau, K.2
Jonker, E.3
-
12
-
-
77954825170
-
Technoscience in crime detection and control: Areview
-
Eneh, O.C., 2010. Technoscience in crime detection and control: Areview. J. Applied Sci., 10: 1873-1884.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 1873-1884
-
-
Eneh, O.C.1
-
13
-
-
34247165153
-
The study of health information system performance from managers and expert's viewpoints
-
Farahbakhsh, M., S. Fozounkhah, H. Sadeghi-Bazargani, A. Zakeri, N. Houshiyan, N. Asmani and A. Naghili, 2007. The study of health information system performance from managers and expert's viewpoints. Inform. Technol. J., 6: 227-231.
-
(2007)
Inform. Technol. J.
, vol.6
, pp. 227-231
-
-
Farahbakhsh, M.1
Fozounkhah, S.2
Sadeghi-Bazargani, H.3
Zakeri, A.4
Houshiyan, N.5
Asmani, N.6
Naghili, A.7
-
14
-
-
79953076038
-
Review of extracting information from the social web for health personalization
-
Fernandez-Luque, L., R. Karlsen and J. Bonander, 2011. Review of extracting information from the social web for health personalization. J. Med. Internet Res., 13: el5-el5.
-
(2011)
J. Med. Internet Res.
, vol.13
-
-
Fernandez-Luque, L.1
Karlsen, R.2
Bonander, J.3
-
15
-
-
67649447229
-
Issues of E-banking transaction: An empirical investigation on malaysian customers perception
-
Haque, A., A. Zaki-Hj-Ismail and A.H. Daraz, 2009. Issues of E-banking transaction: An empirical investigation on malaysian customers perception. J. Applied Sci., 10: 1870-1879.
-
(2009)
J. Applied Sci.
, vol.10
, pp. 1870-1879
-
-
Haque, A.1
Zaki-Hj-Ismail, A.2
Daraz, A.H.3
-
16
-
-
77649311367
-
Improving speaker verification in noisy environments using adaptive filtering and hybrid classification technique
-
Ilyas, M.Z., SA. Samad, A. Hussain and KA. Ishak, 2010. Improving speaker verification in noisy environments using adaptive filtering and hybrid classification technique. Inform. Technol. J., 9: 107-115.
-
(2010)
Inform. Technol. J.
, vol.9
, pp. 107-115
-
-
Ilyas, M.Z.1
Samad, S.A.2
Hussain, A.3
Ishak, K.A.4
-
17
-
-
34249818187
-
E-data privacy and the personal data protection bill of Malaysia
-
Jawahitha, S., M. Ishak and M. Mazahir, 2007. E-data privacy and the personal data protection bill of Malaysia. J. Applied Sci., 7: 732-742.
-
(2007)
J. Applied Sci.
, vol.7
, pp. 732-742
-
-
Jawahitha, S.1
Ishak, M.2
Mazahir, M.3
-
18
-
-
78049441050
-
Government to E-government to E-society
-
Jayashree, S. and G. Marthandan, 2010. Government to E-government to E-society. J. Applied Sci., 10: 2205-2210.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 2205-2210
-
-
Jayashree, S.1
Marthandan, G.2
-
19
-
-
79953117817
-
Using metrics to describe the participative stances of members within discussion forums
-
Jones, R, S. Sharkey, J. Smifhson, T. Ford and T. Emmens et al, 2011. Using metrics to describe the participative stances of members within discussion forums. J. Med. Internet Res., 13: e3-e3.
-
(2011)
J. Med. Internet Res.
, vol.13
-
-
Jones, R.1
Sharkey, S.2
Smifhson, J.3
Ford, T.4
Emmensx, T.5
-
20
-
-
62749135544
-
Feasibility and critical success factors in implementing telemedicine
-
Judi, H.M., A. A. Razak, N. Shaari and H. Mohamed, 2009. Feasibility and critical success factors in implementing telemedicine. Inform. Technol. J., 8: 326-332.
-
(2009)
Inform. Technol. J.
, vol.8
, pp. 326-332
-
-
Judi, H.M.1
Razak, A.A.2
Shaari, N.3
Mohamed, H.4
-
21
-
-
75949130126
-
A security routing optimization scheme for multi-hop wireless networks
-
Jun, D. and L.W. Hua, 2010. A security routing optimization scheme for multi-hop wireless networks. Inform. Technol. J., 9: 506-511.
-
(2010)
Inform. Technol. J.
, vol.9
, pp. 506-511
-
-
Jun, D.1
Hua, L.W.2
-
22
-
-
78149334915
-
A fuzzy inference system for diagnosis of hypothyroidism
-
Khanale, P.B. and R.P. Ambilwade, 2011. A fuzzy inference system for diagnosis of hypothyroidism. J. Artificial Intel., 4: 45-54.
-
(2011)
J. Artificial Intel.
, vol.4
, pp. 45-54
-
-
Khanale, P.B.1
Ambilwade, R.P.2
-
23
-
-
74349083768
-
An efficient analysis of honeypot data based on markov chain
-
Kimou, K.P., B. Barry, M. Babri, S. Oumtanaga and T.L. Kadjo, 2010. An efficient analysis of honeypot data based on markov chain. J. Applied Sciences, 10: 196-202.
-
(2010)
J. Applied Sciences
, vol.10
, pp. 196-202
-
-
Kimou, K.P.1
Barry, B.2
Babri, M.3
Oumtanaga, S.4
Kadjo, T.L.5
-
24
-
-
70349667572
-
The security snalysis and enhancement of photographic authentication
-
Liao, H.C., C.H. Hsieh, C.W. Chen and W.C. Chen, 2009. The security snalysis and enhancement of photographic authentication. Inform. Technol. J., 8: 1170-1179.
-
(2009)
Inform. Technol. J.
, vol.8
, pp. 1170-1179
-
-
Liao, H.C.1
Hsieh, C.H.2
Chen, C.W.3
Chen, W.C.4
-
25
-
-
77954479984
-
A survey of vein recognition techniques
-
Luo, H., F.X. Yu, J.S. Pan, S.C. Chuand, P.W. Tsai, 2010. A survey of vein recognition techniques. Inform. Technol. J., 9: 1142-1149.
-
(2010)
Inform. Technol. J.
, vol.9
, pp. 1142-1149
-
-
Luo, H.1
Yu, F.X.2
Pan, J.S.3
Chuand, S.C.4
Tsai, P.W.5
-
26
-
-
78651376869
-
Joint secret sharing and data hiding for block truncation coding compressed image transmission
-
Luo, H., Z. Zhao and Z.M. Lu, 2011. Joint secret sharing and data hiding for block truncation coding compressed image transmission. Inform. Technol. J., 10: 681-685.
-
(2011)
Inform. Technol. J.
, vol.10
, pp. 681-685
-
-
Luo, H.1
Zhao, Z.2
Lu, Z.M.3
-
27
-
-
62749124406
-
A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on
-
Meng, B., 2009a. A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on Internet voting protocol. Inform. Technol. J., 8: 302-309.
-
(2009)
Internet Voting Protocol. Inform. Technol. J.
, vol.8
, pp. 302-309
-
-
Meng, B.1
-
28
-
-
67651065167
-
Formalizing deniability
-
Meng, B., 2009b. Formalizing deniability. Inform. Technol. J., 8: 625-642.
-
(2009)
Inform. Technol. J.
, vol.8
, pp. 625-642
-
-
Meng, B.1
-
29
-
-
72449173949
-
Internet banking service adoption: Private bank versus governmental bank
-
Mirza, A.P., A. Wallstrom, M.T.H. Beheshti and O.P. Mirza, 2009. Internet banking service adoption: Private bank versus governmental bank. J. Applied Sci., 9: 4206-4214.
-
(2009)
J. Applied Sci.
, vol.9
, pp. 4206-4214
-
-
Mirza, A.P.1
Wallstrom, A.2
Beheshti, M.T.H.3
Mirza, O.P.4
-
30
-
-
78651373987
-
Computationally sound mechanized proofs for deniable authentication protocols with a probabilistic polynomial calculus in computational model
-
Meng, B. and F. Shao, 2010. Computationally sound mechanized proofs for deniable authentication protocols with a probabilistic polynomial calculus in computational model. Inform. Technol. J., 10: 611-625.
-
(2010)
Inform. Technol. J.
, vol.10
, pp. 611-625
-
-
Meng, B.1
Shao, F.2
-
31
-
-
79955879550
-
Suitability of SOAP protocol in securing transmissions of EMR database
-
Nabi, M.S.A., M.L.M. Kiah, B.B. Zaidan, AA. Zaidan and G.M. Alam, 2010. Suitability of SOAP protocol in securing transmissions of EMR database. Int. J. Pharmacol., 6: 959-964.
-
(2010)
Int. J. Pharmacol.
, vol.6
, pp. 959-964
-
-
Nabi, M.S.A.1
Kiah, M.L.M.2
Zaidan, B.B.3
Zaidan, A.A.4
Alam, G.M.5
-
32
-
-
77954777652
-
Online hand signature verification: A review
-
Sayeed, S., A. Samraj, R. Besar and J. Hossen, 2010. Online hand signature verification: A review. J. Applied Sci., 10: 1632-1643.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 1632-1643
-
-
Sayeed, S.1
Samraj, A.2
Besar, R.3
Hossen, J.4
-
33
-
-
77955817289
-
The changing role of accounting in the health care industry
-
Seetharaman, A., J.R. Raj and A.S. Saravanan, 2010. The changing role of accounting in the health care industry. Res. J. Bus. Manage., 4: 91-102.
-
(2010)
Res. J. Bus. Manage.
, vol.4
, pp. 91-102
-
-
Seetharaman, A.1
Raj, J.R.2
Saravanan, A.S.3
-
34
-
-
79953100334
-
Protected health information on social networking sites: Ethical and legal considerations
-
Thompson, LA., E. Black, W.P. Duff, N.P. Black, H. Saliba and K. Dawson, 2011. Protected health information on social networking sites: Ethical and legal considerations. J. Med. Internet Res., 13: e8-e8.
-
(2011)
J. Med. Internet Res.
, vol.13
-
-
Thompson, L.A.1
Black, E.2
Duff, W.P.3
Black, N.P.4
Saliba, H.5
Dawson, K.6
-
35
-
-
67649607300
-
An elliptic curve-based signcryption scheme with forward secrecy
-
Toorani, M. and A. A. Beheshti Shirazi, 2009. An elliptic curve-based signcryption scheme with forward secrecy. J. Applied Sci., 9: 1025-1035.
-
(2009)
J. Applied Sci.
, vol.9
, pp. 1025-1035
-
-
Toorani, M.1
Beheshti Shirazi, A.A.2
-
36
-
-
38949208244
-
Performance evaluation of mobile ad hoc network based communications for future mobile tele-emergency system
-
Viswacheda, D.V., L. Barukang, M.Y. Hamid and M.S. Arifianto, 2007. Performance evaluation of mobile ad hoc network based communications for future mobile tele-emergency system. J. Applied Sci., 7: 2111-2119.
-
(2007)
J. Applied Sci.
, vol.7
, pp. 2111-2119
-
-
Viswacheda, D.V.1
Barukang, L.2
Hamid, M.Y.3
Arifianto, M.S.4
-
37
-
-
79957856706
-
Unconditional security of cryptosystem: A review and outlook
-
Wang, Y., 2011. Unconditional security of cryptosystem: A review and outlook. Trends Applied Sci. Res., 6: 554-562.
-
(2011)
Trends Applied Sci. Res.
, vol.6
, pp. 554-562
-
-
Wang, Y.1
-
38
-
-
77953842860
-
Sharing medical data for health research: The early personal health record experience
-
Weitzman, E.R., L. Kaci and K.D. Mandl, 2010. Sharing medical data for health research: The early personal health record experience. J. Med. Internet Res., 12: el4-el4.
-
(2010)
J. Med. Internet Res.
, vol.12
-
-
Weitzman, E.R.1
Kaci, L.2
Mandl, K.D.3
-
39
-
-
77953856664
-
Sharing health data for better outcomes on PatientsLikeMe
-
Wicks, P., M. Massagli, J. Frost, C. Brownstein and S. Okun et al., 2010. Sharing health data for better outcomes on PatientsLikeMe. J. Med. Internet Res., 12: el9-el9.
-
(2010)
J. Med. Internet Res.
, vol.12
-
-
Wicks, P.1
Massagli, M.2
Frost, J.3
Brownstein, C.4
Okun, S.5
-
40
-
-
77954826595
-
Investigate the capability of applying hidden data in text file: An overview
-
Zaidan, A.A., B.B. Zaidan, A.K. Al-Fraja and HA. Jalab, 2010a. Investigate the capability of applying hidden data in text file: An overview. J. Applied Sci., 10: 1916-1922.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 1916-1922
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Al-Fraja, A.K.3
Jalab, H.A.4
-
41
-
-
77954833269
-
An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael
-
Zaidan, A.A., B.B. Zaidan, A.K. Al-Frajat and HA. Jalab, 2010b. An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael. J. Applied Sci., 10: 2161-2167.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 2161-2167
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Al-Frajat, A.K.3
Jalab, H.A.4
-
42
-
-
78649273195
-
Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem
-
Zaidan, A.A., B.B. Zaidan, A.Y. Taqa, K.M.S. Mustafa, G.M. Alam and HA. Jalab, 2010c. Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem. Int. J. Phys. Sci., 5: 1992-2000.
-
(2010)
Int. J. Phys. Sci.
, vol.5
, pp. 1992-2000
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Taqa, A.Y.3
Mustafa, K.M.S.4
Alam, G.M.5
Jalab, H.A.6
-
43
-
-
77957325769
-
Novel approach for high (Secure and rate) data hidden within triplex space for non multimedia file
-
Zaidan, A.A., B.B. Zaidan, H.O. Alanazi, A. Gani, O. Zakaria and G.M. Alam, 2010d. Novel approach for high (Secure and rate) data hidden within triplex space for non multimedia file. Sci. Res. Essays, 5: 1965-1977.
-
(2010)
Sci. Res. Essays.
, vol.5
, pp. 1965-1977
-
-
Zaidan, A.A.1
Zaidan, B.B.2
Alanazi, H.O.3
Gani, A.4
Zakaria, O.5
Alam, G.M.6
-
44
-
-
78649299082
-
StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem
-
Zaidan, B.B., AA. Zaidan, A. Taqa, G.M. Alam, M.L.M. Kiah and HA. Jalab, 2010e. StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. Int. J. Phys. Sci., 5: 1796-1806.
-
(2010)
Int. J. Phys. Sci.
, vol.5
, pp. 1796-1806
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Taqa, A.3
Alam, G.M.4
Kiah, M.L.M.5
Jalab, H.A.6
-
45
-
-
77954783981
-
On the differences between hiding information and cryptography techniques: An overview
-
Zaidan, B.B., AA. Zaidan, A.K. Al-Frajat and HA. Jalab, 2010f. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
-
(2010)
J. Applied Sci.
, vol.10
, pp. 1650-1655
-
-
Zaidan, B.B.1
Zaidan, A.A.2
Al-Frajat, A.K.3
Jalab, H.A.4
|