The International Arab Journal of Information Technology (IAJIT)

Preventing Collusion Attack in Android

day  activities.  Therefore,  the  security  of  smartpho nes  turns  to  a  great  concern.  Recently,  Android  as  the  most  popular 
#

Verifiable Multi Secret Sharing Scheme for 3D

Abstract: An efficient, computationally secure, verifiable (t , n) multi secret sharing scheme, based on YCH is p roposed for
#

253

Preecha Somwang1, 2 and Woraphon Lilakiatsakun2 1Office of Academic Resources and Information Techno logy, Rajamangala University 

Efficient Modified Elliptic Curve Diffie-Hellman

Abstract: Security in Voice over Internet Protocol (VoIP) ne twork has turned to be the most challenging issue in recent years. 
#

Thomas Brindha and Ramaswamy Shaji
#

Yang Ming1 and Yumin Wang2
#

A Region Adaptive Robust Watermarking Scheme

Motilal Nehru National Institute of Technology, Ind ia 
#

Maryam Lafkih1, Mounia Mikram1, 2, Sanaa Ghouzali1, 3, Mohamed El Haziti1, 4, and Driss Aboutajdine1 1Mohammed V#Agdal University, Morocco 2School of Information Sciences, University of Pitts burgh, Morocco 3Department of Information Technology, King Saud Uni versity, Saudi Arabia 4Higher School of Technology, Morocco
#

Illicit Material Detection using Dual-Energy X-Ray

Computer Engineering Department, Cankaya University , Turkey 
#

Zakir Khan1, Mohsin Shah2, Muhammad Naeem3, Toqeer Mahmood4, Shah Khan5,  
#

Securing RSA Algorithm against Timing Attack

Department of Information Technology, Alpha College  of Engineering and Technology, India 
#

Patching Assignment Optimization for Security

Department of Information Management, National Taiwan University, Taiwan 
#