IIUM Repository

Browse by Email

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 6.

Article

Alkandari, Abdulaziz M and Alkandari, Khalil Ibrahim and Taha, Imad and Alahmad, Mohammad A. (2015) A new design of cryptographic hash function: gear. International Journal on Perceptive and Cognitive Computing (IJPCC), 1 (1). pp. 29-34. ISSN 2462 - 229X

Taha, Imad and Alahmad, Mohammad and Ahmad, Hanadi (2012) Protection of the texts using Base64 and MD5. Journal of Advanced Computer Science and Technology Research(JACSTR), 2 (1). pp. 22-34. ISSN 2231-8852

Proceeding Paper

Alshaikhli, Imad Fakhri Taha and Alahmad, Mohammad (2013) Protection of the digital holy Quran using SAB hash function. In: International Conference on Islamic Applications in Computer Science and Technologies, 1-2 July 2013, Palace of the Golden Horses, Mines Resort City, Kuala Lumpur.

Taha, Imad and Alahmad, Mohammad (2013) SVG and Arabic font challenges and improvements. In: 5th International Conference on Information and Communication Technology for the Muslim World, 26-28 March 2013, Morocco.

Taha, Imad and Alahmad, Mohammad and Munther, Khansaa (2012) Comparison and analysis study of sha-3 finallists. In: International Conference on Advanced Computer Science Applications and Technologies , 26-28 Nov 2012, The Palace of Golden Horses, KL.

Taha, Imad and Alahmad, Mohammad and Ahmad, Hanadi (2012) Protection of text using SHA1 and Base64. In: 3rd International Conference on Cryptology and Computer Security 2012, 4-6 June, 2012, Langkawi.

This list was generated on Sun Oct 20 08:03:24 2024 +08.