A Cooperation of Fog Computing and Smart Gateways in a Secure and Efficient Architecture for IoT-Based Smart Homes
A Cooperation of Fog Computing and Smart Gateways in a Secure and Efficient Architecture for IoT-Based Smart Homes

Amin H. Seno; Sahar A. Alshammari

Volume 37, 7A , July 2019, , Page 290-301

https://doi.org/10.30684/etj.37.7A.10

Abstract
  Nowadays Internet of Things (IoT) is growing to be a serious factor in numerous areas of our daily life style. Internet of Things brings different opportunities of intelligence to important ...  Read More ...
A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment
A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment

Maytham Azhar; Amin H. Seno

Volume 37, 5A , May 2019, , Page 172-180

https://doi.org/10.30684/etj.37.5A.4

Abstract
  In the Internet of Things (IoT) systems, large amounts of data are accumulated from anywhere at any time, which may attack individuals' privacy, especially when systems are utilized ...  Read More ...
Hiding 9 Gray Images In RGB Image and Using Filters For Noise Removing
Hiding 9 Gray Images In RGB Image and Using Filters For Noise Removing

Haraa R. Hatem

Volume 36, 11A , November 2018, , Page 1144-1147

https://doi.org/10.30684/etj.36.11A.2

Abstract
  This paper shows two major techniques, the first is steganography and the second is filters. Gaussian and median filters are used to enhance the quality of image and remove the noise. ...  Read More ...
Multiple Access Chua Chaotic Communication system using Real Orthogonal Matrix Approach
Multiple Access Chua Chaotic Communication system using Real Orthogonal Matrix Approach

Ali A. Radhi

Volume 36, 7A , July 2018, , Page 759-769

https://doi.org/10.30684/etj.36.7A.8

Abstract
  An alternative to traditional Pseudo-Noise (PN)-Sequences, one-dimension (1D) orthogonal chaotic map sequences, and three dimensional (3D) continuous chaotic systems (x,y,z) are generated ...  Read More ...
Cloud Based Secure Web Application
Cloud Based Secure Web Application

Saad K. Majeed; Hanaa M. A. Salman; Ahmed Hashim Mohammed

Volume 33, 8B , October 2015, , Page 1549-1560

https://doi.org/10.30684/etj.2015.117204

Abstract
  The types of web attack continue to appear and add their impacts on web application security, SQL injection, and XSS is one type of these attack, that causes extremely high risk for ...  Read More ...
Safety and Security as an Urban Challenge in Residential Environment*Al- Saadoon as case study
Safety and Security as an Urban Challenge in Residential Environment*Al- Saadoon as case study

Sana Sati Abbas; Alhan Faris Ibrahim Darzy

Volume 32, Issue 3 , March 2014, , Page 118-138

https://doi.org/10.30684/etj.32.3A.19

Abstract
  Architects and urban designers face many dilemmas when they designed any residential complex or a suitable residential environment, and these dilemmas or problems were represented with ...  Read More ...
Proposal for Designing of New BIOS Program
Proposal for Designing of New BIOS Program

Hussein Abdulameer Abdulkadhim; Yousra Ahmed Fadhil; Noor Abdulateef Hassan

Volume 30, Issue 12 , July 2012, , Page 2058-2066

https://doi.org/10.30684/etj.2012.57249

Abstract
  In this paper, a proposal for designing and implementation of general BIOS program have been done. This program consider as a modified version derived from previous versions with configure ...  Read More ...
Color Images Hiding Based on Wavelet Based Fusion
Color Images Hiding Based on Wavelet Based Fusion

Saddam Kamil Alwane

Volume 29, Issue 15 , November 2011, , Page 3158-3171

https://doi.org/10.30684/etj.29.15.10

Abstract
  At present, information is being communicated and proceeds automatically on a large scale. Hence, the required measures for secure storage and transporting of the information are increased. ...  Read More ...
A New Algorithm for Less Distortion and High Capacity Steganography Model Using Blocks-Based Method
A New Algorithm for Less Distortion and High Capacity Steganography Model Using Blocks-Based Method

Wathiq L. Abd Ali; Salah Mahdi Saleh

Volume 28, Issue 13 , June 2010, , Page 2592-2607

https://doi.org/10.30684/etj.28.13.7

Abstract
  Most steganography methods suffer from many problems that effect ontheir efficiency and performance. Some of these are the capacity of cover media,the distortion of cover media, and ...  Read More ...
Secure E-Mail System Using S/Mime and Ib-Pkc
Secure E-Mail System Using S/Mime and Ib-Pkc

Sufyan T. Faraj; Mohammed T. Ibrahem

Volume 25, Issue 4 , June 2007, , Page 646-668

https://doi.org/10.30684/etj.25.4.10

Abstract
  Although e-mail security solutions have been introduced formore than two decades, most of the e-mail messages are sent nowadayswithout being secured by any of these techniques. This ...  Read More ...