The International Arab Journal of Information Technology (IAJIT)

AES Based Multimodal Biometric Authentication using Cryptographic Level Fusion with Fingerprint and Finger Knuckle Print

Department of Electronics and Communication Enginee ring, Kalasalingam University,  
#

Efficient Multimodal Biometric Database Construction and Protection Schemes

multimodal biometric database. The last is dedicate d to a biometric authentication system operating on a set of connected

Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols

Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID

Esther Perumal1 and Shanmugalakshmi Ramachandran2 1Department of Electronics and Communication Enginee ring, Kathir College, India 2Department of CSE, Government College of Technology , India 

Maryam Lafkih1, Mounia Mikram1, 2, Sanaa Ghouzali1, 3, Mohamed El Haziti1, 4, and Driss Aboutajdine1 1Mohammed V#Agdal University, Morocco 2School of Information Sciences, University of Pitts burgh, Morocco 3Department of Information Technology, King Saud Uni versity, Saudi Arabia 4Higher School of Technology, Morocco
#

A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes

Abstract: Hash functions are the most widespread among all cr yptographic primitives, and are currently used in multiple

An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc

Rajaram Ayyasamy1 and Palaniswami Subramani2 1Electronics and Communication Engineering Departmen t, Karpagam College of Engineering, Anna 

A Novel Authentication Mechanism Protecting Users Privacy in Pervasive Systems

Abstract : Transparency of the system and it s integration into the natural environment of the user are some of the important
#

Semi Fragile Watermarking for Content based Image Authentication and Recovery in the DWT-DCT

Abstract: Content authentication requires that the image watermarks must highlight malicious attacks while tolerating

Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)

Abstract: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share

Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve

University, Jordan 3Department of Information Technology, Al-Balqa Applied University, Jordan

A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes

Abstract: Hash functions are the most widespread among all cr yptographic primitives, and are currently used in multiple