Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by Wrya Karim Kadir
Total Records ( 2 ) for Wrya Karim Kadir
  Wrya Karim Kadir , Omed Hassan Ahmed and Mohammed Rafiq Namiq
  Elliptic curve cryptography has been studied extensively for many years and the cryptosystems based on Elliptic Curve Cryptography (ECC) is becoming the recent trend of public key cryptography. This study presents the implementation of ECC using both Bob’s public key and common shared key in the encryption process. This feature increases the security of scheme. In contrast with common proposed techniques we eliminate the shared look up table between the sender and receiver and we do not need to map the ASCII value to an affine point in the elliptic curve. The technique is designed in such a way that can be used to encrypt and decrypt any type of script with ASCII value defined.
  Sarkar Hasan Ahmed , Aram Mahmood Ahmed , Omed Hasan Ahmed and Wrya Karim Kadir
  These days, using Smartphone is getting more common in the world and they are provided with powerful hardware resources and variety of communicating methods. A robust security model is applied to develop android operating systems that works on Smartphone and tablets. But it does not satisfy some users, especially whom with confidential and delicate data transmission and whom who keeps these kinds of data on their devices. At this time, users may turn to use third party applications to archive this satisfaction. In this research, a combination of Steganography and Cryptography techniques is proposed to design a third-party application for devices that run android platform to solve this issue. Also, resource limitations of different Smartphones and tablets is assessed to test whether this new technique can be handled by these devices or not as mobile devices has resource limitations if it compared to personal computers. Least Significant Bit (LSB) Steganography algorithm is used for hiding the texts and enhanced playfair algorithm as a Cryptography algorithm is used for encrypting the texts. It seems that through considering the attitudes to clean energies and their efficiency through inspiring past experiences in a combination of past and present time can not only show response to the coming problems but also it can cover some parts of economic considerations.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility