Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
HMAC Modification Using New Random Key Generator

Dr. Shaimaa H. Shaker

Volume 14, Issue 1 , April 2014, , Page 72-82

Abstract
  Abstract –Cryptographic hash functions have been very significant primitives to the cryptography. They have been utilized widely in cryptographic applications and the most important of which is their use in the composition of efficient Message Authentication Codes (MACs). Cryptanalysts cannot break ...  Read More ...

Human Authentication with Earprint for Secure Telephone System

Raid R. Al-Nima

Volume 12, Issue 2 , December 2012, , Page 47-55

Abstract
  Abstract: This paper describes the design and development of a prototype system for the automatic authentication of an individual based on the human ear patterns. Information at the feature extraction and at the confidence level, where the matching scores are reported by Probabilistic neural network, ...  Read More ...