Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Communication
Review: Dual Method Cryptography and Steganography in Video Frames in IoT

Rawia Abdullah Muhammed; Maisa'a Abid Ali Al-Dabbas; Ashwak Mahmood Alabaichi

Volume 23, Issue 3 , September 2023, , Page 139-155

https://doi.org/https://doi.org/10.33103/uot.ijccce.23.3.12

Abstract
  The Internet of things (IoT) is one of those emerging technologies, which aregoing to rule the world in the next few decades. The IoT environment not only enablesHuman to Machine interaction but also fosters Machine to Machine connectivity.Numerous IoT devices have poor security and insufficient computing ...  Read More ...

Computer
A Lightweight Hash Function Based on Enhanced Chaotic Map Algorithm(Keccak)

Yusra Ahmed Ghareeb; Ekhlas Khalaf Gbashi

Volume 22, Issue 2 , June 2022, , Page 53-62

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.5

Abstract
  Cryptography is a security strategy that prevents disclosure of the information while it is transit, in storage, or both. There are a variety of methods for maintaining data security, including utilizing light weight speed algorithms for encryption and parameter validation. Many algorithms have originated ...  Read More ...

Computer
Designing a New Lightweight AES Algorithm to Improve the Security of the IoT Environment

Sameeh Abdulghafour Jassim; Alaa K. Farhan

Volume 22, Issue 2 , June 2022, , Page 96-108

https://doi.org/https://doi.org/10.33103/uot.ijccce.22.2.9

Abstract
  Recently, the Internet of Things (IoT) is begin used in many fields such as smart homes, healthcare systems, industrial applications, etc. Therefore, the use of the IoT led to a growth in the number of dangers especially in the areas of privacy and security for applications running on low- resource computers. ...  Read More ...

A Comparative Study of Researches Based on Magic Square in Encryption with Proposing a New Technology

Ibrahim Malik ALattar; Abdul Monem S Rahma

Volume 21, Issue 2 , June 2021, , Page 102-114

Abstract
  This paper aims to develop a new cryptographic algorithm that isbased on the magic square method of order five with multi message lengths tobe more complex in order to increase the complexity; in addition to comparingthe cipher with the use of the magic square of order five, four and three (allsingle ...  Read More ...