Search Results - Taha, Imad
- Showing 1 - 20 results of 20
-
1
Cryptographic hash function: a high level view by Taha, Imad, Alahmad, Mohammad A.
Published 2015Get full text
Get full text
Get full text
Book Chapter -
2
Security of present s-box by Taha, Imad, Salim, Sufyan
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
3
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC) by Taha, Imad, Sahasrabuddhe, H.V.
Published 1999Get full text
Get full text
Get full text
Proceeding Paper -
4
Protecting an Internet Web File using Java by Taha, Imad, Naef, Asaad
Published 2004Get full text
Get full text
Get full text
Article -
5
New statistical Binary Random Test by Taha, Imad, Hasan, Luay
Published 2006Get full text
Get full text
Article -
6
Protection of text using SHA1 and Base64 by Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
7
An anatomy of IGP and BGP routing protocols by Taha, Imad, Alkandari, Abdulrahman
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
8
SVG and Arabic font challenges and improvements by Taha, Imad, Alahmad, Mohammad
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
9
-
10
Protection of the texts using Base64 and MD5 by Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi
Published 2012Get full text
Get full text
Get full text
Article -
11
Lightweight block ciphers: A comparative study by Salim, Sufya, Taha, Imad
Published 2012Get full text
Get full text
Get full text
Article -
12
Quality evaluation of “safeer” portal for Saudi students studying abroad by Taha, Imad, Alzuabi, Haifa
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
-
15
Protection of integrity and ownership of pdf documents using invisible signature by Taha, Imad, Zeki, Akram M., Pathan, Al-Sakib Khan, makarim, rusydi
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
16
Comparison and analysis study of sha-3 finallists by Taha, Imad, Alahmad, Mohammad, Munther, Khansaa
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
17
-
18
-
19
Comparative study on content-based image retrieval CBIR) by Taha, Imad, Farid, Sumaira, Hussain, Ayyaz
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
20
Traffic management system based on wsn in Kuwait: an initial design by Taha, Imad, Alkandari, Abdulrahman, alnasheet, Meshal
Published 2012Get full text
Get full text
Get full text
Proceeding Paper
