Keywords = security
Number of Articles: 9
A Cooperation of Fog Computing and Smart Gateways in a Secure and Efficient Architecture for IoT-Based Smart Homes
Volume 37, 7A , July 2019, , Page 290-301
Abstract
Nowadays Internet of Things (IoT) is growing to be a serious factor in numerous areas of our daily life style. Internet of Things brings different opportunities of intelligence to important ... Read More ...A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment
Volume 37, 5A , May 2019, , Page 172-180
Abstract
In the Internet of Things (IoT) systems, large amounts of data are accumulated from anywhere at any time, which may attack individuals' privacy, especially when systems are utilized ... Read More ...Hiding 9 Gray Images In RGB Image and Using Filters For Noise Removing
Volume 36, 11A , November 2018, , Page 1144-1147
Abstract
This paper shows two major techniques, the first is steganography and the second is filters. Gaussian and median filters are used to enhance the quality of image and remove the noise. ... Read More ...Multiple Access Chua Chaotic Communication system using Real Orthogonal Matrix Approach
Volume 36, 7A , July 2018, , Page 759-769
Abstract
An alternative to traditional Pseudo-Noise (PN)-Sequences, one-dimension (1D) orthogonal chaotic map sequences, and three dimensional (3D) continuous chaotic systems (x,y,z) are generated ... Read More ...Cloud Based Secure Web Application
Volume 33, 8B , October 2015, , Page 1549-1560
Abstract
The types of web attack continue to appear and add their impacts on web application security, SQL injection, and XSS is one type of these attack, that causes extremely high risk for ... Read More ...Safety and Security as an Urban Challenge in Residential Environment*Al- Saadoon as case study
Volume 32, Issue 3 , March 2014, , Page 118-138
Abstract
Architects and urban designers face many dilemmas when they designed any residential complex or a suitable residential environment, and these dilemmas or problems were represented with ... Read More ...Proposal for Designing of New BIOS Program
Volume 30, Issue 12 , July 2012, , Page 2058-2066
Abstract
In this paper, a proposal for designing and implementation of general BIOS program have been done. This program consider as a modified version derived from previous versions with configure ... Read More ...Color Images Hiding Based on Wavelet Based Fusion
Volume 29, Issue 15 , November 2011, , Page 3158-3171
Abstract
At present, information is being communicated and proceeds automatically on a large scale. Hence, the required measures for secure storage and transporting of the information are increased. ... Read More ...A New Algorithm for Less Distortion and High Capacity Steganography Model Using Blocks-Based Method
Volume 28, Issue 13 , June 2010, , Page 2592-2607