The International Arab Journal of Information Technology (IAJIT)

Privacy-Preserving Data Mining in Homogeneous

Department of Communication Electronics and Compute r Engineering, Helwan University, Egypt
#

Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols

Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID

Maryam Lafkih1, Mounia Mikram1, 2, Sanaa Ghouzali1, 3, Mohamed El Haziti1, 4, and Driss Aboutajdine1 1Mohammed V#Agdal University, Morocco 2School of Information Sciences, University of Pitts burgh, Morocco 3Department of Information Technology, King Saud Uni versity, Saudi Arabia 4Higher School of Technology, Morocco
#

 Curve Cryptography and its Variants 
#

A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography

Abstract: When an image is created by multiple authors, it is  reasonable that no single author monopolize the ow nership. The 

Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve

University, Jordan 3Department of Information Technology, Al-Balqa Applied University, Jordan

Progressive Visual Cryptography with Friendly and Size Invariant Shares

like shares. As long as there are over k shares stacked out of n shares, the secret image can be directly decoded by the human

A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography

Abstract: When an image is created by multiple authors, it is  reasonable that no single author monopolize the ow nership. The 

New Fool Proof Examination System through Color Visual Cryptography and Signature Authentication

Mohamed Fathimal1 and Arockia Jansirani2 1Department of Computer Science and Engineering, SRM Institute of Science and Technology, India 2Department of Computer Science and Engineering, Manonmaniam Sundaranar University, India