Found: 54 resources
information hiding using E-mail cards
Al-Rafidain University College For Sciences, 2008, Volume , Issue 23, Pages 1-22
Modeling Dynamic Background based on Linear Equation
Ibn Al-Haitham Journal For Pure and Applied Sciences, 2019, Volume 32, Issue 2, Pages 156-165
A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information
Engineering and Technology Journal, 2010, Volume 28, Issue 6, Pages 1061-1072
Watermarks Technique in MPEG-1Video by B-spline
Engineering and Technology Journal, 2010, Volume 28, Issue 11, Pages 2162-2177
A Knowledge Representation Language for Arabic Semantic Web Using Resources Description Framework
Engineering and Technology Journal, 2010, Volume 28, Issue 18, Pages 5631-5639
Development cryptography protocol based on Magic Square and Linear Algebra System
Journal of Al-Qadisiyah for Computer Science and Mathematics, 2019, Volume 11, Issue 1, Pages Comp Page 72-75
Index seek technique for Querying Encrypted Databases
Journal of Al-Qadisiyah for Computer Science and Mathematics, 2019, Volume 11, Issue 3, Pages Comp Page 59-68
Table scan technique for querying over an encrypted database
Journal of Baghdad College of Economic sciences University, 2019, Volume , Issue 59, Pages 437-454
A Comparative Study of Researches Based on Magic Square in Encryption with Proposing a New Technology
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2021, Volume 21, Issue 2, Pages 102-114
A Proposed Method for Detecting Fake Art by Using B-Spline Curves
Engineering and Technology Journal, 2012, Volume 30, Issue 2, Pages 203-221