-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8by Marwah k HussienSubjects: “...Stereoimaging, Stereoimage compression, Imageencryption, cryptography....”
Published 2018-04-01
Get full text
Article -
9by Estabraq Abdulredaa KadhimInstructorSubjects: “...Cryptography...”
Published 2018-11-01
Get full text
Article -
10
-
11
-
12Subjects: “...biometrics, cryptography, fingerprint, rsa, morphological operation, minutiae points....”
Get full text
Article -
13by Estabraq Abdulredaa KadhimSubjects: “...– cryptography, key generation, rna, bimolecular computation, polynomial convolution...”
Published 2018-06-01
Get full text
Article -
14
-
15Subjects: “...cryptography, key generation, parser, chicken swarm optimization, html code, symmetric key...”
Get full text
Article -
16by Farah Mohammed“... information hiding and multiple watermarking. The first principle is represented by cryptography...”
Published 2011-07-01
Get full text
Article -
17“... that are very hard, if not impossible, to be broken.<br /> This paper employs cryptography scheme utilizes...”
Get full text
Article -
18by Baghdad Science Journal“...The objective of this work is to design and implement a cryptography system that enables the sender...”
Published 2011-12-01
Get full text
Article -
19by Baghdad Science Journal“...The objective of this work is to design and implement a cryptography system that enables the sender...”
Published 2008-09-01
Get full text
Article -
20by Baghdad Science Journal“...in recent years cryptography has played a big role especially in computer science for information...”
Published 2006-03-01
Get full text
Article