A Cooperation of Fog Computing and Smart Gateways in a Secure and Efficient Architecture for IoT-Based Smart Homes
A Cooperation of Fog Computing and Smart Gateways in a Secure and Efficient Architecture for IoT-Based Smart Homes

Amin H. Seno; Sahar A. Alshammari

Volume 37, 7A , July 2019, , Page 290-301

https://doi.org/10.30684/etj.37.7A.10

Abstract
  Nowadays Internet of Things (IoT) is growing to be a serious factor in numerous areas of our daily life style. Internet of Things brings different opportunities of intelligence to important ...  Read More ...
A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment
A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment

Maytham Azhar; Amin H. Seno

Volume 37, 5A , May 2019, , Page 172-180

https://doi.org/10.30684/etj.37.5A.4

Abstract
  In the Internet of Things (IoT) systems, large amounts of data are accumulated from anywhere at any time, which may attack individuals' privacy, especially when systems are utilized ...  Read More ...
Artificial Neural Networks Based Fingerprint Authentication
Artificial Neural Networks Based Fingerprint Authentication

Abbas H. Issa

Volume 33, 5A , June 2015, , Page 1255-1271

https://doi.org/10.30684/etj.33.5A.19

Abstract
  Fingerprint authentication and recognition is an important subject that has been widely used in various applications because of its reliability and accuracy in the process of authenticating ...  Read More ...
Two Factor Authentication Based Generated One Time Password
Two Factor Authentication Based Generated One Time Password

Hilal Hadi; Rana Faeez

Volume 33, 3B , March 2015, , Page 373-383

https://doi.org/10.30684/etj.33.3B.1

Abstract
  This paper explains a method of how the two factors authentication implemented using software token to generateOne Time Password (OTP)to secure users accounts. The proposed method guarantees ...  Read More ...
Secret Sharing Scheme Based Technique for Authentication of Documents Images
Secret Sharing Scheme Based Technique for Authentication of Documents Images

Muna Ghazi; Hanaa M. A. Salman

Volume 32, 6B , June 2014, , Page 1092-1105

https://doi.org/10.30684/etj.32.6B.8

Abstract
  Digital document image is a form of persevering important information, and, because of rapid technological development, it is easy to copy, counterfeit this digital document image and ...  Read More ...
A Proposed System for Sound Retrieval Using MAS and ANN
A Proposed System for Sound Retrieval Using MAS and ANN

Abeer Tariq; Ikhlas khalaf; shatha habeeb

Volume 30, Issue 14 , August 2012, , Page 2480-2492

https://doi.org/10.30684/etj.30.14.11

Abstract
  As the use of sounds for computer interfaces, electronic equipment and multimedia contents, has increased, the role of sound design tools has become more important. In sound retrieval, ...  Read More ...
A Proposed Secure Protocol for E-Mail System Based on Authentication and Hash Function
A Proposed Secure Protocol for E-Mail System Based on Authentication and Hash Function

Muna Mohammed Al-Nayar

Volume 29, Issue 16 , December 2011, , Page 3291-3301

https://doi.org/10.30684/etj.29.16.3

Abstract
  Internet has opened new channel of communication enabling an e-mail to be sent to a relative thousands of kilometers away. This medium of communication opens doors for virtually free ...  Read More ...
A Secure Mobile Banking Using Kerberos Protocol
A Secure Mobile Banking Using Kerberos Protocol

Mohammad N. Abdullah; May T. Abdul-Hadi

Volume 27, Issue 6 , April 2009, , Page 1127-1133

https://doi.org/10.30684/etj.27.6.10

Abstract
  Because the network is an open environment, a lot of care must be taken whentransferring sensitive information especially when related with financial data. This dependson the principals ...  Read More ...