The International Arab Journal of Information Technology (IAJIT)

Preventing Collusion Attack in Android

day  activities.  Therefore,  the  security  of  smartpho nes  turns  to  a  great  concern.  Recently,  Android  as  the  most  popular 
#

Verifiable Multi Secret Sharing Scheme for 3D

Abstract: An efficient, computationally secure, verifiable (t , n) multi secret sharing scheme, based on YCH is p roposed for
#

KP-TrieAlgorithmfor Update and Search Operations

Abstract:Radix-Tree is a space optimized data structure that performs data compression by means of cluster nodes that share

Efficient Modified Elliptic Curve Diffie-Hellman

Abstract: Security in Voice over Internet Protocol (VoIP) ne twork has turned to be the most challenging issue in recent years. 
#

Extension for Real Time Applications  
#

Extension for Real Time Applications  
#

A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography

Abstract: When an image is created by multiple authors, it is  reasonable that no single author monopolize the ow nership. The 

Baraa Sharef 1, 3, Nazlia Omar1, and Zeyad Sharef 2

Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)

Abstract: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share

Progressive Visual Cryptography with Friendly and Size Invariant Shares

like shares. As long as there are over k shares stacked out of n shares, the secret image can be directly decoded by the human

A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography

Abstract: When an image is created by multiple authors, it is  reasonable that no single author monopolize the ow nership. The