The International Arab Journal of Information Technology (IAJIT)

Privacy-Preserving Data Mining in Homogeneous

Department of Communication Electronics and Compute r Engineering, Helwan University, Egypt
#

Vulnerability Analysis of Two Ultra lightweight RFID Authentication Protocols

Abstract: Ultra lightweight Radio Frequency Identification (RFID) authentication protocols are suitable for lo w*cost RFID

Maryam Lafkih1, Mounia Mikram1, 2, Sanaa Ghouzali1, 3, Mohamed El Haziti1, 4, and Driss Aboutajdine1 1Mohammed V#Agdal University, Morocco 2School of Information Sciences, University of Pitts burgh, Morocco 3Department of Information Technology, King Saud Uni versity, Saudi Arabia 4Higher School of Technology, Morocco
#

 Curve Cryptography and its Variants 
#

A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography

Abstract: When an image is created by multiple authors, it is  reasonable that no single author monopolize the ow nership. The 

Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve

University, Jordan 3Department of Information Technology, Al-Balqa Applied University, Jordan

Progressive Visual Cryptography with Friendly and Size Invariant Shares

like shares. As long as there are over k shares stacked out of n shares, the secret image can be directly decoded by the human

A Joint Ownership Protection Scheme for Digital Images Based on Visual Cryptography

Abstract: When an image is created by multiple authors, it is  reasonable that no single author monopolize the ow nership. The