Biometric identity authentication system using hand geometry measurements HH Mohammed, SA Baker, AS Nori Journal of Physics: Conference Series 1804 (1), 012144, 2021 | 24 | 2021 |
Design and implementation of Threefish cipher algorithm in PNG file AS Nori, AO Abdulmajeed Sustainable Engineering and Innovation 3 (2), 79-91, 2021 | 10 | 2021 |
Internet of things security: a survey SA Baker, AS Nori Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021 | 10 | 2021 |
An Investigation for Steganography using Different Color System A Sallow, Z Taha, A Nori AL-Rafidain Journal of Computer Sciences and Mathematics 7 (3), 91-108, 2010 | 9 | 2010 |
Steganography in mobile phone over bluetooth S Baker, A Nori International Journal of Information Technology and Business Management …, 2013 | 8 | 2013 |
A secure proof of work to enhance scalability and transaction speed in blockchain technology for IoT SA Baker, AS Nori AIP Conference Proceedings 2830 (1), 2023 | 2 | 2023 |
Honey Encryption Security Techniques: A Review Paper A Gharbi, A Nori AL-Rafidain Journal of Computer Sciences and Mathematics 16 (1), 1-14, 2022 | 2 | 2022 |
Improve Security Using Steganography and Cryptography Based on Smartphone Users Locations AM Ahmed, AS Nori 2022 Second International Conference on Advances in Electrical, Computing …, 2022 | 2 | 2022 |
Steganography Method of the Bigger Size in WebP Image Using M2PAM Algorithm for Social Applications OA Najm, AS Nori Turkish Journal of Computer and Mathematics Education (TURCOMAT) 13 (2), 595-610, 2022 | 2 | 2022 |
Lightweight Authentication for Devices in Internet of Thing Environment: A Survey SA Fadhel, AS Nori AL-Rafidain Journal of Computer Sciences and Mathematics 17 (2), 55-62, 2023 | 1 | 2023 |
Modern steganography method based on Shearlet transformation with quad chain code MM Mohamed, AS Nori AIP Conference Proceedings 3219 (1), 2024 | | 2024 |
Review “The Digital Revolution for the Security of Hiding Information inside the Quick Response Code” AZ Younis, AS Nori International Research Journal of Innovations in Engineering and Technology …, 2024 | | 2024 |
LAM-IoT: Lightweight Authentication Model for monitoring systems in IoT-enabled smart homes based on DID using IOTA SA Fadhel, AS Nori International Journal of Computing and Digital Systems 16 (1), 1-15, 2024 | | 2024 |
Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey OA Najm, A Nori Al-Rafidain Journal of Computer Sciences and Mathematics 18 (1), 125-130, 2024 | | 2024 |
An Evaluation Review of Steganography Using a Hybrid Method Technique of Quad Chain Code and Discrete Shearlet Transform MMM Fathel, AS Nori International Research Journal of Innovations in Engineering and Technology …, 2023 | | 2023 |
Improving Security Using Cryptography Based on Smartphone User Locations A Nori Journal of Education and Science 31 (2), 94.0-104.0, 2022 | | 2022 |
A Comparison of the Randomness Analysis of the Modified Rectangle Block Cipher and Original algorithm SA Baker, AS Nori NTU Journal of Pure Sciences 1 (2), 10-21, 2022 | | 2022 |
Blind Steganalysis using One-Class Classification AS Nori AL-Rafidain Journal of Computer Sciences and Mathematics 13 (2), 2019 | | 2019 |
Information Hiding in Color Image based on LSB and FA AS Nori, J Ibrahim Jasim Kirkuk Journal of Science 12 (3), 361-376, 2017 | | 2017 |
Data Hiding over Mobile Phones using Socket Network Communication AS Nori, SA Baker International Journal of Computer Science Issues (IJCSI) 10 (6), 201, 2013 | | 2013 |