Your search returned 18 results. Subscribe to this search

|
1. Design Secure E-Voting Scheme / by Hnaity, Omar Al . Publication: Amman : 2008 Date: 2008 Availability: No items available:

2. Secure Designated Signature Scneme / by Hamdan, Ala`a Ali . Publication: Amman : 2008 . 68 P. Date: 2008 Availability: No items available:

3. Percluding Software Piracy Using Asymmetric Cryptography / by Jabber, Zeana Satter . Publication: عمان : 2009 . 64 P. Date: 2009 Availability: No items available:

4. Designing A Secure E- Payment protocol / by Al, Mahmmoud Muslem Ishtean . Publication: Amman : 2009 . 43 P. Date: 2009 Availability: No items available:

5. Anonymous and non-repudiation E-cash scheme based on partially blind sigature / by almatari, hani M. . Publication: . 130 P. Availability: No items available:

6. Mobile Trade Agent Security / by alqudsy, zainab nouman yousif . Publication: . 74 P. Availability: No items available:

7. Secure Authentication Protocol and Key Agreement for Mobile Networks Using Public-Key Cryptography / by Fayoumi, Haneen Mohammed Al . Publication: Amman 2016 . 121 P. Date: 2016 Availability: No items available:

8. enhancing the bellovin and cheswick's algorithm by adding dummy values and reoder process / by eshtaiwi, fadi yousef ali . Publication: . 103 P. Availability: No items available:

9. Enhancing open space method in data hiding technique - text under text / by abdallah, yaman fakhri issa . Publication: . 98 P. Availability: No items available:

10. Text Hiding in (RGBA) Images Using the Alpha Channel and Indicator Method / by Sarayreh, Ghaith Salem . Publication: Amman : 2014 . 60 P. Date: 2014 Availability: No items available:

11. New Method for Image Inside Image Steganography / by Faleh, Ahmad . Publication: Amman : 2014 . 68 P. Date: 2014 Availability: No items available:

12. Text Image steganography Using LSD Method / by Ahmad, Jalal . Publication: Amman : 2014 . 53 P. Date: 2014 Availability: No items available:

13. new techniqure to embed encrypted or code in colored image by using first and third lsb / by abdulrahman, muataz safauldeen . Publication: amman : 2001 . 73 P. Date: 2001 Availability: No items available:

14. An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection / by , Shatha Abd . Publication: Amman : 2014 . 90 P. Date: 2014 Availability: No items available:

15. An Enhanced Classifier for an Authentication in Keystroke Dynamics Using Experimental Data / by Al, Abdullah Osamah . Publication: Amman : 2014 . 80 P. Date: 2014 Availability: No items available:

16. A secure Home Appliiances Remote Control Model / by Jasim, Mohammed Mohammed . Publication: Amman : 2014 . 65 P. Date: 2014 Availability: No items available:

17. Comparative Analysis of the Performance for Cloud Computing Hypervisors with Encrypted Algorithms / by Abdulraheem, Waleed Khaled Amin . Publication: Amman : 2014 . 100 P. Date: 2014 Availability: No items available:

18. Image Steganography Based on Discrete Wavelet Transform and Enhancing Resilient Backpropogation Neural Network / by Al, Ahmed Shihab Ahmed . Publication: Amman : 2015 . 96 P. Date: 2015 Availability: No items available:

Powered by Koha