|
other_w |
2021-03 |
International Journal of Advances in Scientific Research and Engineering (ijasre) |
أ.م . امل عبدالباقي مريوش |
Subject Review: Information Steganography Based on Different Methods |
1 |
|
other_w |
2022-04 |
International Journal of Computer Science and Mobile Applications |
أ.م . امل عبدالباقي مريوش |
A Review: Data Mining Techniques and Its Applications |
2 |
|
scopus |
2021-08 |
Bulletin of Electrical Engineering and Informatics |
أ.م . امل عبدالباقي مريوش |
Image Confusion and Diffusion Based on Multi-Chaotic system and Mix-Column |
3 |
|
scopus |
2020-12 |
TELKOMNIKA Telecommunication, Computing, Electronics and Control |
أ.م . امل عبدالباقي مريوش |
A new block cipher for image encryption based on multi chaotic systems |
4 |
|
scopus |
2020-02 |
TELKOMNIKA Telecommunication, Computing, Electronics and Control |
أ.م . امل عبدالباقي مريوش |
Iris images encryption based on QR code and chaotic map |
5 |
|
thomson |
2020-01 |
Journal of Information Security and Applications |
أ.م . امل عبدالباقي مريوش |
Block image encryption based on modified playfair and chaotic system |
6 |
|
other_w |
2019-09 |
International Journal of Engineering Research and Advanced Technology (IJERAT) |
أ.م . امل عبدالباقي مريوش |
Subject review: cloud computing security based on cryptography |
7 |
|
other_w |
2019-09 |
International Journal of Engineering Research and Advanced Technology (IJERAT) |
أ.م . امل عبدالباقي مريوش |
Review: Image Encryption Techniques based on Chaotic Map |
8 |
|
other_w |
2019-08 |
International Journal of Engineering Research and Advanced Technology (IJERAT) |
أ.م . امل عبدالباقي مريوش |
Recognition of Retain Images Based on Association Rules |
9 |
|
scopus |
2018-12 |
International Journal of Civil Engineering and Technology |
أ.م . امل عبدالباقي مريوش |
A New Block Cipher Algorithm for Image Encryption Based on Chaotic System and S-Box |
10 |
|
science |
2016-03-16 |
International Journal of Applied Information Systems (IJAIS) |
أ.م . امل عبدالباقي مريوش |
Data Security for Cloud Computing based on Elliptic Curve Integrated Encryption Scheme (ECIES) and Modified Identity based Cryptography (MIBC) |
11 |
|
local |
2015-07 |
Journal of College of Education |
أ.م . امل عبدالباقي مريوش |
Enhancing the Security of Identity and Access Management in Cloud Computing using Elliptic Curve Cryptography |
12 |
|
local |
2017-04-26 |
Conference of College of Education, Mustansiriyah University |
أ.م . امل عبدالباقي مريوش |
Data Security in Cloud Computing Architecture Based on Modified AES |
13 |
|
science |
2015-08-28 |
IOSR Journal of Computer Engineering (IOSR-JCE) |
أ.م . امل عبدالباقي مريوش |
Improving data storage security in cloud computing using elliptic curve cryptography |
14 |