Your search returned 14 results. Subscribe to this search

|
1. Design Secure E-Voting Scheme / by Hnaity, Omar Al . Publication: Amman : 2008 Date: 2008 Availability: No items available:

2. Secure Designated Signature Scneme / by Hamdan, Ala`a Ali . Publication: Amman : 2008 . 68 P. Date: 2008 Availability: No items available:

3. Designing A Secure E- Payment protocol / by Al, Mahmmoud Muslem Ishtean . Publication: Amman : 2009 . 43 P. Date: 2009 Availability: No items available:

4. Anonymous and non-repudiation E-cash scheme based on partially blind sigature / by almatari, hani M. . Publication: . 130 P. Availability: No items available:

5. enhancing the bellovin and cheswick's algorithm by adding dummy values and reoder process / by eshtaiwi, fadi yousef ali . Publication: . 103 P. Availability: No items available:

6. Enhancing open space method in data hiding technique - text under text / by abdallah, yaman fakhri issa . Publication: . 98 P. Availability: No items available:

7. Text Hiding in (RGBA) Images Using the Alpha Channel and Indicator Method / by Sarayreh, Ghaith Salem . Publication: Amman : 2014 . 60 P. Date: 2014 Availability: No items available:

8. New Method for Image Inside Image Steganography / by Faleh, Ahmad . Publication: Amman : 2014 . 68 P. Date: 2014 Availability: No items available:

9. Text Image steganography Using LSD Method / by Ahmad, Jalal . Publication: Amman : 2014 . 53 P. Date: 2014 Availability: No items available:

10. new techniqure to embed encrypted or code in colored image by using first and third lsb / by abdulrahman, muataz safauldeen . Publication: amman : 2001 . 73 P. Date: 2001 Availability: No items available:

11. An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection / by , Shatha Abd . Publication: Amman : 2014 . 90 P. Date: 2014 Availability: No items available:

12. An Enhanced Classifier for an Authentication in Keystroke Dynamics Using Experimental Data / by Al, Abdullah Osamah . Publication: Amman : 2014 . 80 P. Date: 2014 Availability: No items available:

13. Comparative Analysis of the Performance for Cloud Computing Hypervisors with Encrypted Algorithms / by Abdulraheem, Waleed Khaled Amin . Publication: Amman : 2014 . 100 P. Date: 2014 Availability: No items available:

14. Image Steganography Based on Discrete Wavelet Transform and Enhancing Resilient Backpropogation Neural Network / by Al, Ahmed Shihab Ahmed . Publication: Amman : 2015 . 96 P. Date: 2015 Availability: No items available:

Powered by Koha