ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: PK
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Simplified and Effective Dual-Round Image Encryption Robust Technique
Mohamad Al-Laham,Bilal Bataineh,Ziad Alqadi
#Cryptography
#plain image
#cipher image
#decrypted image
#PK
#indices key
#CK
#CLMM
#rows shuffling
#columns shuffling
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Computational Intelligence Based Point of Interest Detection by Video Surveillance Implementations
Emre Tercan,Serkan Tapkın,Furkan Küçük,Ali Demirtaş,Ahmet Özbayoğlu,Abdussamet Türker
#Point of interest detection
#YOLO algorithm
#R-CNN
#TOOD
#deep learning
Optimum Threshold Parameter Estimation of
MohammadMotiur Rahman1, MithunKumar Pk1, and MohammadShorif Uddin2 1Department of Computer Science and Engineering, Maw lana Bhashani Science and
#
Curve Cryptography and its Variants
#
2009
Mohamed Ben Messaoud, Besma Khelil, and Abdennaceur Kachouri
#ECG
# P wave detection
# correlation
# regression
# diagnosis
Jean De Dieu Nkapkop1,2, Joseph Effa1, Monica Borda2, Laurent Bitjoka3, and Alidou Mohamadou4
#Fast and secure encryption
# chaotic sequence
# linear diophantine equation
# NIST test
An Efficient Certificateless Designated
School of Mathematics and Statistics, Wuhan Univers ity, China
#CL%PKC
# DVS
# bilinear pairings
# elliptic curve
# ran dom oracle model
Toward Proving the Correctness of TCP Protocol Using CTL
Rafat Alshorman
#CTL
# model checking
# TCP protocols
# correctness conditions
# kripke structure
Swarm Intelligence Approach to QRS Detection Mohamed Belkadi and Abdelhamid Daamouche
Signals and Systems Laboratory, Institute of Electrical and Electronics Engineering, Universite M’Hamed
#ECG
# QRS detection
# Pan-Tompkins algorithm
# Particle Swarm Optimization
Intrusion Detection Model Using Naive Bayes and Deep Learning Technique
Mohammed Tabash, Mohamed Abd Allah, and Bella Tawfik
#Classification
# intrusion detection
# deep learning
# NSL-KDD
# genetic algorithm
# naïve bayes
MPKC-based Threshold Proxy Signcryption Scheme
Li Huixian1, Gao Jin1, Wang Lingyun1, and Pang Liaojun2
#Multivariate public key cryptosystem
# signcryption
# threshold proxy signcryption
# quantum attack
Mining Android Bytecodes through the Eyes of Gabor Filters for Detecting Malware
Shahid Alam,Alper Kamil Demir
#Android bytecode
#malware analysis and detection
#sliding window
#gabor filters
#gabor features
#machine learning
Partitioning State Spaces of Concurrent Transition Systems Mustapha Bourahla
efficient new methods to deal with the large real-size of concurrent transition systems. We propose a new algorithm for
#Concurrent transition systems
# distributed and parallel analysis
# abstraction
# partitioning
# refinement
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint