Keywords = Encryption
Number of Articles: 55

1

A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes

Ibn Al-Haitham Journal For Pure And Applied Science
Volume 29, Issue 3, Autumn 2016, Page 209-221
Rahim Abdul-Al Sahib Ogla

2

A Hybrid Verifiable and Delegated Cryptographic Model in Cloud Computing

Journal of University of Babylon
Volume 26, Issue 3, Summer 2018, Page 67-74
Jaber Ibrahim Naser

3

A Modified Technique For Image Encryption

Journal of Univesity of Thi-Qar
Volume 5, Issue 1, Winter 2010, Page 1-11
Dr. Turki Y. Abdalla; Hameed A. Younis

4

A New Algorithm to Encryption and Compression Image Data File

JOURNAL OF EDUCATION AND SCIENCE
Volume 24, Issue 1, Winter 2011, Page 108-118
Riyad Mubarak Abdullah

5

A New Technique For Image Encryption

Journal of Univesity of Thi-Qar
Volume 6, Issue 2, Spring 2011, Page 1-11
Dr. Turki Y. Abdalla; Hameed A. Younis

6

Apply Block Ciphers Using Tiny Encryption Algorithm (TEA)

Baghdad Science Journal
Volume 7, Issue 2, Spring 2010, Page 1061-1069
Hana Rashied Ismaeel

7

A Proposed Algorithm to Improve the Security Level of Advanced Encryption Standard

Iraqi Journal of Applied Physics
Volume 8, Issue 4, Autumn 2012, Page 29-32
H.M. Azzawi

8

A Proposed Method for Encrypting Data In Image by Using Cryptography Technique and Steganography

AL-MANSOUR JOURNAL
Volume 0, Issue 22, Summer 2017, Page 95-109
Hasan M. Azzawi

9

A Random Key Generation Approach for Rijndael Algorithm

Journal of Al-Nahrain University - Science
Volume 15, Issue 3, Summer 2012, Page 190-195
Dalal Naeem Hmood

10

A Secure Enhancement for Encoding/ Decoding data using Elliptic Curve Cryptography

Iraqi Journal of Science
Volume 59, Issue 1, Spring 2018, Page 189-198
Kawther E. Abdullah; Nada Hussein M. Ali

11

Build Encrypted Chat System by using multicast technique with determine delay time

Journal of College of Education for Pure Science
Volume 4, Issue 1, Spring 2014, Page 215-220
Atheer Y. Oudah; Wessam A. hamed; Hyder Y. Atwan

12

Chaotic Encryption Based on Biometric Key

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 7, Issue 3, Autumn 2010, Page 183-198
Saja J. Mohammed; Melad jader saeed; Ielaf O. Abdul Majjed

13

Ciphering an Embedded Text Based in Magic Squares (MS) and It's Applications

Tikrit Journal of Pure Science
Volume 19, Issue 5, Summer 2014, Page 135-137
Mageed Hameed Ali

14

CIPHERING OF TEXT BY USING SHFIT REGISTER TECHNIQUE AND ITS TRANSMISSION OVER OPTICAL FIBER

Al-Qadisiyah Journal for Engineering Sciences
Volume 3, Issue 1, Winter 2010, Page 91-108
Haider J. Abd; Mohanned Hassan Ali

15

Data encryption Using Backpropagation Neural Network

Tikrit Journal of Pure Science
Volume 15, Issue 2, Summer 2010, Page 112-117
Raid R. Al-nima

16

Data integrity enhancement for the encryption of color images based on CRC64 technique using multiple look-up tables

Iraqi Journal of Science
Volume 58, Issue 3, Spring 2018, Page 1729-1739
Nada Hussein M. Ali; Ruaa A. Abdul-Sattar

17

Data Security Protection in Cloud Computing by using Encryption

kirkuk university journal for scientific studies
Volume 12, Issue 4, Autumn 2017, Page 276-286
Asst. Lec. Ghassan Sabeeh Mahmood

18

Design and Simulation of Secure Communication System

Journal of Engineering and Sustainable Development
Volume 18, Issue 4, Summer 2014, Page 155-161
Ahmed S. Hadi; Zaid Ali Salman; Saleem M. Mohammed

19

Design New Algorithm For Partial Image Encryption Based colors Space

Journal of University of Babylon
Volume 20, Issue 2, Spring 2012, Page 458-471
Ali A.Yassin

20

Development AES Algorithm to Encryption Images and Sounds Files

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 9, Issue 1, Spring 2012, Page 113-127
Mohammed C.Y. Al-Zubaidy

21

Encrypt and Hide Data in True Color Image Classes

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 10, Issue 3, Summer 2013, Page 75-89
Maha A. Hasso; Shahad A. Hasso; Ban Ghanem Maayouf

22

Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 7, Issue 3, Autumn 2010, Page 199-208
Amera Istiqlal Badran; Abdulsattar M. Khidhir; laheeb Mohammed Ibrahim

23

Encryption and Compression Digital Video Files using Artificial Neural Networks and Genetic Algorithm

JOURNAL OF EDUCATION AND SCIENCE
Volume 28, Issue 4, Autumn 2019, Page 189-205
Hasan M.A. Anwer

24

Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 8, Issue 2, Autumn 2011, Page 87-97
Shaimaa Sh. Mohammad

25

Enhance the Hiding Image by Using Compression and Securing Techniques

Iraqi Journal for Computers and Informatics ijci
Volume 43, Issue 1, Spring 2017, Page 14-16
Saif Saad; Fouad H. Awad; Ahmed S. Farhan

26

Enhancing The Encryption Process Of Advanced Encryption Standard (AES) By Using Proposed Algorithm To Generate S-Box

Journal of Engineering and Sustainable Development
Volume 18, Issue 2, Spring 2014, Page 89-105
Hasan M. Azzawi

27

Fast Techniques For Partial Encryption of Wavelet-based Digital Images

basrah journal of science
Volume 25, Issue 2, Autumn 2007, Page 78-96
Abdulkareem Y. Abdalla; Hameed A. Younis; Turki Y. Abdalla

28

Finding the Best Key Stream by Using Genetic Algorithm for Image Encryption

Journal of Basrah Researches (Sciences)
Volume 36, Issue 3, Summer 2010, Page 72-80
Issa A. Abed

29

Hardware Implementation of Artificial Neural Network for Data Ciphering

Tikrit Journal of Engineering Sciences
Volume 23, Issue 2, Spring 2016, Page 74-85
Sahar L. Kadoory; Toka A. Fatehi; Qutaiba A. Hasan

30

Hyper Secure Algorithm for Text

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 8, Issue 2, Autumn 2011, Page 51-65
Melad jader saeed

31

Image Encryption Using Block Cipher Based Serpent Algorithm

Engineering and Technology Journal
Volume 34, Issue 2, Winter 2016, Page 278-286
Yossra Hussain Ali; Haider Aabdali Ressan

32

Improvement of A5/1 encryption algorithm based on Using Unit Delay

journal of al-qadisiyah for pure science(quarterly)
Volume 14, Issue 3, Summer 2014, Page 211-222
Sattar B. Sadkhan

33

Measurement of Encryption Quality of Bitmap Images with RC6, and two modified version Block Cipher

Engineering and Technology Journal
Volume 28, Issue 17, Summer 2010, Page 5603-5613
Baedaa H. Helal; Ashwaq T. Hashim

34

Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes

Iraqi Journal of Science
Volume 57, Issue 4, Summer 2016, Page 2968-2978
Nada Hussein M. Ali; Suaad Ali Abead

35

New Approach for Serpent Block Cipher Algorithm Based on Multi Techniques

Iraqi Journal of Information Technology
Volume 7, Issue 3, Summer 2017, Page 1-13
Israa Ahmed; Gada Ali; Semaa Hassin; Alaa kadhim F

36

Partial Encryption Of Color Image By Edge Detection

Journal of Al-Qadisiyah for Computer Science and Mathematics
Volume 2, Issue 2, Autumn 2010, Page 1-19
Ali A.Yassin

37

Proposal New Approach of Block Cipher using A.I

Iraqi Journal of Information Technology
Volume 6, Issue 4, Autumn 2014, Page 80-94
Alaa Kadhim

38

Proposal New S-box for AES Algorithm Depend on A.I Bee Colony

Engineering and Technology Journal
Volume 33, Issue 1, Winter 2015, Page 12-24
Alaa Kadhim; Sura Khalaf

39

Proposal of New Block Cipher Algorithm Depend on Public Key Algorithms

AL-MANSOUR JOURNAL
Volume 0, Issue 26, Autumn 2017, Page 119-140
Fadhil H. Abbood; Ameen A. Noor; Hussein Abed

40

Proposal to Complex DES Security Using Diffie Hellman Injection

Engineering and Technology Journal
Volume 29, Issue 6, Spring 2011, Page 1216-1226
Shatha habeeb Jafar

41

Proposed Hybrid-Encryption System for Multicast Network

Engineering and Technology Journal
Volume 28, Issue 24, Autumn 2010, Page 7027-7036
Mohammad Natiq Fadhil Ibraheem

42

Proposed Method for Text Encryption Using Two Secret Keys and One Secret Mathematical Equation

Al-Rafidain University College For Sciences
Volume 0, Issue 24, Winter 2017, Page 72-87
Qusay M. Jafar Alsadi

43

Reliable Implementation of Paillier Cryptosystem

Iraqi Journal of Applied Physics
Volume 10, Issue 4, Autumn 2014, Page 27-29
Alia K. Abdul Hassan

44

Retrieving Encrypted Query from Encrypted Database Depending on Symmetric Encrypted Cipher System Method

Diyala Journal For Pure Science
Volume 13, Issue 1, Winter 2017, Page 183-207
Ghassan H. Abdul-Majeed; Alaa Kadhim F; Rasha Subhi Ali

45

Secured Smart Card Simulation

Journal of Engineering
Volume 18, Issue 4, Spring 2012, Page 459-471
Oday A.L.A Ridha; Sarkout N. Abdulaah; Zahraa Ali Jwad

46

Secure mining of the cloud encrypted database

Journal of Basrah Researches (Sciences)
Volume 43, Issue 2, Autumn 2017, Page 44-57

47

Secure Video Coded System Model

Iraqi Journal for Computers and Informatics ijci
Volume 42, Issue 1, Autumn 2016, Page 5-9
Tariq Adnan Fadil

48

Speech Encryption Using Chaotic Map and Blowfish Algorithms

Journal of Basrah Researches (Sciences)
Volume 39, Issue 2, Spring 2013, Page 68-76
Maysaa abd ulkareem Nasser and Iman Qays Abduljaleel

49

Stream Cipher Using Genetic Algorithm

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 6, Issue 3, Autumn 2009, Page 111-126
Melad jader saeed

50

Text Compression & Encryption Method Based on RNA and MTF

Iraqi Journal of Science
Volume 58, Issue 2, Winter 2018, Page 1149-1158
Ekhlas Khalaf Gbashi

51

Use the Genetic Algorithm to Encode and Hide Gray Image Data

AL-Rafidain Journal of Computer Sciences and Mathematics
Volume 10, Issue 1, Winter 2013, Page 169-182
Raya Jassim Essa; Reham Jassim Essa; Inam Muhammad Sulaiman

52

Visual Cryptography for Color Image with Discrete Wavelet Transform & Chaos Theory

Iraqi Journal of Information Technology
Volume 7, Issue 2, Spring 2017, Page 17-34
Alaa Kadhim; Rand Mahmoud

53

Wireless Network Security Based on Multiple Cipher Techniques

Iraqi Journal of Information Technology
Volume 7, Issue 3, Summer 2017, Page 14-30
Hesham A. ALABBASI

54

X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys

Iraqi Journal of Science
Volume 57, Issue 1, Winter 2016, Page 742-754
Qusay Mohamed Jaafar

55

طرق التشفير وفك التشفير باستخدام زمرة المنحنى البيضوي

مجلة الکلیة الاسلامیة الجامعة
Volume 4, Issue 7, Winter 2009, Page 11-18
م.م. نجلاء فلاح حميد; أ.د. ستار بدر سد خان