Protection mechanisms using MD5 and Base64
| Main Authors: | A. Ahmad, Mohammad, Alshaikhli, Imad Fakhri Taha, Mohammad Ahmed, Hanady, Shah, Asadullah |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/20190/ http://irep.iium.edu.my/20190/1/6.pdf |
Similar Items
Developed system for Quran protection using MD5 and Base64
by: A. Ahmad, Mohammad, et al.
Published: (2011)
by: A. Ahmad, Mohammad, et al.
Published: (2011)
Protection of the texts using Base64 and MD5
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Protection mechanisms using LSB and MD5
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Protection of text using SHA1 and Base64
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Achieving security for images by LSB and MD5
by: Alahmad, Mohammad, et al.
Published: (2012)
by: Alahmad, Mohammad, et al.
Published: (2012)
Developed system for Quran protection using LSB replacement and MD5
by: A. Ahmad, Mohammad, et al.
Published: (2011)
by: A. Ahmad, Mohammad, et al.
Published: (2011)
The use of genetic algorithm in improving medical image segmentation techniques
by: Hassan, Raini, et al.
Published: (2011)
by: Hassan, Raini, et al.
Published: (2011)
Molecular docking
by: Abduallah Alsafi, Hassen Mohammed, et al.
Published: (2011)
by: Abduallah Alsafi, Hassen Mohammed, et al.
Published: (2011)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)
by: Alahmad, Mohammad, et al.
Published: (2017)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Data recovery and business continuity in cloud computing: a review of the research literature
by: Alshammari, Mohammad M., et al.
Published: (2016)
by: Alshammari, Mohammad M., et al.
Published: (2016)
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016)
by: Khalaf, Emad Taha, et al.
Published: (2016)
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
A framework for evaluating skyline queries over incomplete data
by: Gulzar, Yonis, et al.
Published: (2016)
by: Gulzar, Yonis, et al.
Published: (2016)
Disaster recovery in single-cloud and multi-cloud
environments: Issues and challenges
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Windows installation
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Task scheduling
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Basic storage management
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Blogging: a new platform for spreading rumors!
by: Zangana, Hewa Majeed, et al.
Published: (2015)
by: Zangana, Hewa Majeed, et al.
Published: (2015)
Image editing
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image effects
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image tool function
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image clone 1
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image clone 2
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image and special effects
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Basic text effects
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Text animation
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Text effects
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Image filtering
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Similar Items
-
Developed system for Quran protection using MD5 and Base64
by: A. Ahmad, Mohammad, et al.
Published: (2011) -
Protection of the texts using Base64 and MD5
by: Taha, Imad, et al.
Published: (2012) -
Protection mechanisms using LSB and MD5
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011) -
Protection of text using SHA1 and Base64
by: Taha, Imad, et al.
Published: (2012) -
Achieving security for images by LSB and MD5
by: Alahmad, Mohammad, et al.
Published: (2012)