Two Factor Authentication Based Generated One Time Password
Two Factor Authentication Based Generated One Time Password

Hilal Hadi; Rana Faeez

Volume 33, 3B , March 2015, , Page 373-383

https://doi.org/10.30684/etj.33.3B.1

Abstract
  This paper explains a method of how the two factors authentication implemented using software token to generateOne Time Password (OTP)to secure users accounts. The proposed method guarantees ...  Read More ...
A Proposed System for Sound Retrieval Using MAS and ANN
A Proposed System for Sound Retrieval Using MAS and ANN

Abeer Tariq; Ikhlas khalaf; shatha habeeb

Volume 30, Issue 14 , August 2012, , Page 2480-2492

https://doi.org/10.30684/etj.30.14.11

Abstract
  As the use of sounds for computer interfaces, electronic equipment and multimedia contents, has increased, the role of sound design tools has become more important. In sound retrieval, ...  Read More ...
Proposal to Complex DES Security Using Diffie Hellman Injection
Proposal to Complex DES Security Using Diffie Hellman Injection

Shatha habeeb Jafar

Volume 29, Issue 6 , April 2011, , Page 1216-1226

https://doi.org/10.30684/ etj.29.6.15

Abstract
  Data Encryption Standard (DES) is based on a round of starters, from the results of the use of multi-stage permutation and replacement to the more complex algorithm which adopts the ...  Read More ...
Proposed Hybrid-Encryption System for Multicast Network
Proposed Hybrid-Encryption System for Multicast Network

Mohammad Natiq Fadhil Ibraheem

Volume 28, Issue 24 , December 2010, , Page 7027-7036

https://doi.org/10.30684/etj.28.24.16

Abstract
  In this paper the proposed method based on two encrypted algorithms (Public key, and Block cipher) at the same time, it allowed a sender to encrypt the multicast packet and forward ...  Read More ...