Found: 115 resources
Client Authentication By Selected Secure Password-Based On Image Using Challenge Handshake Authentication Protocol
Iraqi Journal of Information Technology, 2019, Volume 9, Issue 3 اللغة الانكليزية, Pages 39-49
Speaker Authentication Using Vector Quantization
Baghdad Science Journal, 2009, Volume 6, Issue 4, Pages 804-810
Active Network Security Based RSA Algorithm
Journal of Engineering, 2009, Volume 15, Issue 4, Pages 4163-4175
IMPROVEMENT OF DATA INTEGRITY USING DIFFERENT ENCRYPTION ALGORITHMS
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2011, Volume 11, Issue 2, Pages 1-6
A Proposed System for Sound Retrieval Using MAS and ANN
Engineering and Technology Journal, 2012, Volume 30, Issue 14, Pages 2480-2492
Human Authentication with Earprint for Secure Telephone System
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2012, Volume 12, Issue 2, Pages 47-55
Secret Sharing Scheme Based Technique for Authentication of Documents Images
Engineering and Technology Journal, 2014, Volume 32, Issue 6 Part (B) Scientific, Pages 1092-1105
MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION
DIYALA JOURNAL OF ENGINEERING SCIENCES, 2015, Volume 8, Issue 4, Pages 479-492
Authentication and Secure Image System Based on Combining Image Cryptography and Digital Watermarking
journal of kerbala university, 2016, Volume 14, Issue 1, Pages 186-198
Message Authentication Using New Hash Function
Al-Nahrain Journal of Science, 2016, Volume 19, Issue 3, Pages 148-153