Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Proposed Pseudo Random Generator Based on RC5 Block Cipher

Ashwaq Talib Hashim; Zaid Mundher Radeef

Volume 17, Issue 1 , December 2017, , Page 33-41

Abstract
  Digital cryptography relies greatly on randomness in providing the security requirements imposed by various information systems. Just as different requirements call for specific cryptographic techniques, randomness takes upon a variety of roles in order to ensure the proper strength of these cryptographic ...  Read More ...

Modification of RC5 Algorithm for Image Encryption

Ashwaq T. Hashim; Dr. Rasha Fahim Nathim; Gaidaa Saeed Mahdi

Volume 14, Issue 2 , August 2014, , Page 62-71

Abstract
  Abstract – Encryption is mainly used to transmit the data over networks. There are so many techniques introduced which are used to protect the confidential image data from any unauthorized access. Multimedia data contains different types of data that includes text, audio, video, graphic, and images ...  Read More ...

Information Hiding in Image Based on Random Locations

Mohsin H. AL-Zohairi

Volume 12, Issue 2 , December 2012, , Page 9-15

Abstract
  Abstract: Network Security for data transmission is the most vital issue in modern communication systems. This paper discusses a new steganographic technique and the effectiveness of the proposed method is described through which the idea of enhanced security of data can be achieved. To hide data in ...  Read More ...

AN IMPROVED DATA CONFIDENTIALITY PROTOCOL BASED ON TIMESTAMP

Amer Kais Obaid

Volume 12, Issue 1 , June 2012, , Page 53-59

Abstract
  Security and data confidentiality has become a critical issue for companies and individuals. In a classical client-server network, the access control management is performed on the server, relying on the assumption that the server is a trusted party. In this paper, we focus on how to strengthen the ...  Read More ...