Preferred Language
Articles
/
jih-711
Lagrange Interpolation for Mobile Agent Connection Encryption

A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Aug 20 2022
Journal Name
Journal Of Legal Sciences
نظرية المخاطر كأساس للمسؤولية الدولية عن أعمال مجلس الأمن المشروعة دولياً والمتسمة بخطورة استثنائية

     International responsibility rises against the United Nations Organization for the actions of the Security Council according to the theory of risks, in the event that ships, submarines and aircraft carriers that operate with nuclear energy are launched against countries that violate the provisions of Chapter VII the Charter  of the United Nations, considering that the Council's actions here are considered as internationally legitimate acts of exceptional risks that the Council may resort to it in order to ensure the speed and effectiveness referred to in Article (11 / Paragraph 2) of the charter and to keep pace with developments in modern technology.

Crossref
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Scientific Research Journal Of Engineering And Computer Science
Cryptography Techniques - A Review

With the explosive growth of the internet and its wide usage in our lives over the last few years, data security is one of the most important for anyone using it. Data security guarantees that the sending data can be accessed and read by only authorized persons and ensure no change happens in this data. There are many methods used to achieve this goal. One of the most common methods is cryptography, which is used to convert data to unreadable data by human eyes, except if the sender uses the same algorithm and key. This paper reviews some research dealing with cryptography and shows the different methods applied in cryptography fields for various security purposes.

Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Employ of Public Relations in Building Awareness of Security against Terrorism A Survey of the Employees of the Directorate General of Public Relations and Media at the Ministry of Interior

This study aims at identifying the role played by Public Relations in the field of security awareness of the dangers of terrorism. The research is directed to the employees at the Directorate General of Public Relations and Media at the Ministry of Interior. And that on the basis that those who play an important role in the security awareness are the security institutions, primarily the Ministry of Interior, since this Directorate is responsible for all subjects related to the public security using public relations science. It aims at identifying the functions, methods and communication tools used by the Directorate to raise awareness about the dangers of terrorism. In order to achieve the research objectives, the researcher uses the sur

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
EVALUATION OF ELECTRONIC GOVERNMENT SECURITY ISSUES APPLIED TO COMPUTER CENTER OF BAGHDAD UNIVERSITY (CASE STUDY)

Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 13 2021
Journal Name
Al-nahrain Journal Of Science
Hiding Multi Short Audio Signals in Color Image by using Fast Fourier Transform

Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa

... Show More
Crossref
View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
New Research Trends in Designing E-Government Architecture Based on Blockchain Technology

Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated.  This work studies and analyzes some research trends focused on blockchain

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Effects of Water Scarcity on Rural Household Economy

This study examined the effects of water scarcity on rural household economy in El Fashir Rural Council / North Darfur State- western Sudan. Both quantitative and qualitative methods were used as to get a deeper understanding of the impact of water scarcity on the rural house economy in the study area. 174 households out of 2017 were selected from 45 villages which were distributed in eight village councils forming the study area. Statistical methods were used to manipulate the data of the study. The obtained results revealed that water scarcity negatively affected the rural household economy in the study area in many features. These include the followings: much family efforts and time were directed to fetch for water consequentl

... Show More
Crossref (1)
Crossref
View Publication Preview PDF