Enhancement of the cast block algorithm based on novel S-box for image encryption RS Ali, OZ Akif, SA Jassim, AK Farhan, ESM El-Kenawy, A Ibrahim, ... Sensors 22 (21), 8527, 2022 | 77 | 2022 |
Graphical password based mouse behavior technique ZA Abdalkareem, OZ Akif, FA Abdulatif, A Amiza, P Ehkan Journal of Physics: Conference Series 1755 (1), 012021, 2021 | 10 | 2021 |
A New Pseudorandom Bits Generator Based on a 2D-Chaotic System and Diffusion Property OZ Akif, S Ali, RS Ali, AK Farhan Bulletin of Electrical Engineering and Informatics 10 (3), 1580-1588, 2021 | 9 | 2021 |
Achieving flatness: Honeywords generation method for passwords based on user behaviours OZ Akif, AF Sabeeh, GJ Rodgers, HS Al-Raweshidy International Journal of Advanced Computer Science and Applications (IJACSA …, 2019 | 7 | 2019 |
Image encryption technique using Lagrange interpolation OZ Akif Ibn Al-Haitham Journal for Pure and Applied Science 25 (1), 2012 | 4 | 2012 |
Protecting a sensitive dataset using a time based password in big data OZ Akif, GJ Rodgers, HS Al-Raweshidy 2017 Computing Conference, 871-879, 2017 | 3 | 2017 |
Smart Flow Steering Agent for End-to-End Delay Improvement in Software-Defined Networks OF Hussain, BR Al-Kaseem, OZ Akif Baghdad Science Journal 18 (1), 0163-0163, 2021 | 2 | 2021 |
Secure authentication procedures based on timed passwords, honeypots, honeywords and multi-factor techniques OZ Akif Brunel University London, 2017 | 1 | 2017 |
A propose method for hiding image into image AO Ibadi, MOZ Akif, MAF Razzak Baghdad College of Economic sciences University 20140429 (Special Issue …, 2013 | | 2013 |
A Proposed Algorithm for Steganography OZ Akif, AO Ibadi Ibn Al-Haitham Journal For Pure and Applied Sciences 23 (3), 2010 | | 2010 |