ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: Share
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
A New (k, n) Secret Image Sharing Scheme (SISS)
Amitava Nag,Sushanta Biswas,Debasree Sarkar,Partha Sarkar
#complete graph
#spanning tree
#Prüfer sequence
#(k
# n) threshold secret image sharing
Induction of Co-existing Items Available in Distributed Version Control Systems for Software Development
Sibel Özyer
#Version control systems
#requirement analysis
#co-occurrence analysis
#natural language processing
MAPNEWS: A Framework for Aggregating and Organizing Online News Articles
Jeelani Ahmed,Muqeem Ahmed
#News aggregation
#information retrieval
#clustering
#data aggregation
#web scrapping
Preventing Collusion Attack in Android
day activities. Therefore, the security of smartpho nes turns to a great concern. Recently, Android as the most popular
#
Verifiable Multi Secret Sharing Scheme for 3D
Abstract: An efficient, computationally secure, verifiable (t , n) multi secret sharing scheme, based on YCH is p roposed for
#
KP-TrieAlgorithmfor Update and Search Operations
Abstract:Radix-Tree is a space optimized data structure that performs data compression by means of cluster nodes that share
#Trie
# radix tree
# data structure
# branch factor
# indexing
# tree structure
# information retrieval
Efficient Modified Elliptic Curve Diffie-Hellman
Abstract: Security in Voice over Internet Protocol (VoIP) ne twork has turned to be the most challenging issue in recent years.
#
Extension for Real Time Applications
#
Extension for Real Time Applications
#
in Wireless Sensor Networks
#Wireless sensor networks; compression
# routing
# en ergy efficiency
# lifetime
# shortest path Received December 14
# 2007; accepted March 12
# 2008 1
A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography
Abstract: When an image is created by multiple authors, it is reasonable that no single author monopolize the ow nership. The
#Joint ownership protection
# visual cryptography
# di screte cosine transform
Baraa Sharef 1, 3, Nazlia Omar1, and Zeyad Sharef 2
#Arabic TC
# FRAM
# automatic TC
# text classification
Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)
Abstract: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share
#Phishing
# two-factor authentication
# web security
# google cloud messaging
# mobile authentication
Progressive Visual Cryptography with Friendly and Size Invariant Shares
like shares. As long as there are over k shares stacked out of n shares, the secret image can be directly decoded by the human
#Visual cryptography
# progressive visual cryptography
# secret sharing
# unexpanded share
# meaningful (Friendly) share
A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography
Abstract: When an image is created by multiple authors, it is reasonable that no single author monopolize the ow nership. The
#Joint ownership protection
# visual cryptography
# di screte cosine transform
#Digital signature
# non-expansion visual cryptography
# boolean operation
# visual share
A Cloud-based Architecture for Mitigating Privacy
Issues in Online Social Networks
#Online social network
# cloud computing
# user’s privacy
# access control
# broadcast encryption
Predicting the Winner of Delhi Assembly Election, 2015 from Sentiment Analysis on Twitter Data-A
BigData Perspective
#Election winner prediction
# big data
# sentiment analysis
# tweet mining
# map reduce
1
2
»
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint