Preferred Language
Articles
/
ijs-5647
Secure Location Privacy Transmitting Information on Cellular Networks

      As smartphones incorporate location data, there is a growing concern about location  privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area information by means of the geographic position method of these gadgets. Every cell phone can create a token. The token holds secret keys got from versatile fixed identifiers for the most part of the Social Security Number (SSN) for each SIM (Endorser Personality Module) Chronic Number) and IMEI (Global Portable Hardware Character) by RSA calculation. The token is going through the short and informative administration of Short Message Service (SMS) from the client to the outsider. Information is scrambled before being stored on a faraway worker. The actual worker can't comprehend the area’s information. The third-party cannot follow the area if the client utilizes distinctive mystery keys. The client’s data and area information are saved by the various workers. The proposed application offers a mysterious sharing instrument that uses token verification to grant clients access to scrambled area data and provides encryption data in a remote server with an authentication token, achieving mutual authentication on each mobile device and user concealment.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Secure Marketing Website

The  Internet  provides business  with  new methods of reaching  and interacting with ·customers as  well as  improving inter  and  intra  business communication.

In  this  research, a  soft.ware  marketing web  site  with  a security

tools   is  designed  and   implemented  to  protect   the  customer  pers.onal information  and   payment   information  when  a  customer   tries  to  pay  a software package.

A  new   protectior.t method   is suggested  to  protect &nbsp

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain

     The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Secure Big Data Transmission based on Modified Reverse Encryption and Genetic Algorithm

      The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
The Graphic privacy in vector graphics design for children's publications

         The graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of Legal Sciences
Privacy the work for public benefit punishment

Work for public benefit (Community service) is a criminal punishment that restricts liberty. The convicted person performs an unpaid work for public benefit, The judge determine in the ruling the number of working hours and the period of completion within the limits set by the law. It is a new and unique punishment that involves punitive treatment outside the prison walls. It spawned of the necessities of rehabilitative justice to Confrontation the crisis of the punishment for deprivation of liberty for a short period (custody). The main aim of the work penalty for public benefit is to rehabilitate the convict to reintegrate him socially, which is the first rank among the aims of punishment under contemporary punitive policy. This punish

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
Scopus (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Review of Challenges and Solutions for Genomic Data Privacy-Preserving

     The dramatic decrease in the cost of genome sequencing over the last two decades has led to an abundance of genomic data. This data has been used in research related to the discovery of genetic diseases and the production of medicines. At the same time, the huge space for storing the genome (2–3 GB) has led to it being considered one of the most important sources of big data, which has prompted research centers concerned with genetic research to take advantage of the cloud and its services in storing and managing this data. The cloud is a shared storage environment, which makes data stored in it vulnerable to unwanted tampering or disclosure. This leads to serious concerns about securing such data from tampering and unauthoriz

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
The Effect of Aqueous Extract of Citrullius colocynthis Seeds on Cellular Immunity

The aqueous extract of Citrullius colocynthis dried seeds (160 ?g/ml) was in vitro evaluated for its effect on phagocytic index (PI) and lymphocyte transformation index (LTI) of blood cells obtained from 30 apparently healthy blood donors (15 males and 15 females). The PI was further in vivo evaluated in cells of peritone, spleen and liver of mice treated with the extract at a dose of 0.64 mg/kg. The results revealed that in in vitro study, phagocytic cells treated with the extract showed a significant increased percentage as compared with untreated cells (60.0 vs. 44.1%). Phagocytes obtained from peritone (44.1 vs. 30.0%) and spleen (45.6 vs. 39.6 %) of treated and untreated mice behaved in a similar manner, while liver phagocytes showed n

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Wed Oct 01 2014
Journal Name
Al–bahith Al–a'alami
The Arts of Media Writing / An Empirical Study on the Privacy of Media Writing

Media writing is accuracy writing. Clarity and concision are its predominant features. It is a writing that goes straight to the essence because it has no time to waste. Furthermore, it must be as accurate as scientific writing. It is destined for the average reader and has to be understood by everyone. However, it can be as elegant as literary writing. The variety in its forms of expression does not prevent media writing from having its own amplitude.

In short, this study is a practical approach that aims at studying different kinds of writing styles and identifying the specificity of media writing using some patterns and examples

Crossref
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon

Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well a

... Show More
Scopus (6)
Crossref (7)
Scopus Crossref
View Publication Preview PDF