Skip to content
VuFind
  • Feedback
  • Book Bag: 0 items (Full)
  • Login
    • العربية
    • الإنجليزية

Discover Knowledge Resources!

Explore our comprehensive collection of books, articles, digital media, and more

Advanced
  • OneSearch
  • Library Catalog
  • Digital Repository
  • Channels
  • Proposed method of factorization analysis to break the RSA algorithm \
Search for more channels:

Similar Items: Proposed method of factorization analysis to break the RSA algorithm \

Enhanced Method for RSA cryptoststem algorithm \

Introduction to the design & analysis of algorithms /

The design and analysis of algorithms /

Introduction to the design & analysis of algorithms /

A hybrid fingerprint identification & verification algorithm \

Data structures & algorithm analysis in C++ /

Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /

Virus detection using artificial immune system with genetic algorithm \

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Development and performance analysis of a probabilistic flooding algorithm in noisy mobile Ad Hoc networks \

Adaptive genetic algorithm for production system \

Data structures and algorithm analysis in Java /

Data structures and algorithm analysis in Java /

Algorithms /

Development and performance analysis of a probabilistic flooding algorithm in noisy mobile Ad Hoc networks \

Development and performance analysis of optimal multipoint relaying algorithm for noisy mobile Ad Hoc networks \

Improving the performance of naïve nayes algorithm for Arabic text categorization \

Development and performance analysis of hybrid IPSec SSL VPN technology \

A proposed algorithm to hide text inside 3D colors images \

Introduction to algorithms /

Topic: Computer networks

Library and information networks in the United Kingdom /

Principles of information security /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Development and performance analysis of hybrid IPSec SSL VPN technology \

Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /

Enhancement of IEEE 802.11 layer handoff process and protocol \

E-business /

E-Commerce systems architecture and applications

Electronic finance : a new approach to financial sector development? /

Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /

The effects of time triggered Ethernet on the network \

AN INTRODUCTION TO OSI / INCHOLAS HEAP

Introduction to E-business : Management and strategy /

Design and analysis of computer communication networks /

Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /

Networking in easy steps /

Computer networks : principles, technologies, and protocols for network design /

Cumputer Networks Lab /

Making search work : implementing Web, intranet, and enterprise search /

Introduction to information systems /

Topic: Computer security

  • Topic: Genetic algorithms
  • Topic: Security measures

Principles of information security /

Integrating security and software engineering : advances and future visions /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Information security : principles and practice /

Encyclopedia of information ethics and security /

Information hiding technique in digital image using transform domain \

Foundations of computer science : from data manipulation to theory of computation /

Network security : private communication in a public world /

Bi-directional transition mechanism between IPv4 and IPv6 \

The art of software security assessment : identifying and preventing software vulnerabilities /

Risk Assessment in Cyber-Physical System /

Foundations of computer security /

Information security fundamentals /

A method for improving the Bluetooth key exchange security /

A hybrid fingerprint identification & verification algorithm \

Computer security : principles and practice /

Information security : a strategic approach /

Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /

Information security : principles and practices /

Security in computing /

Author: Obaid, Bilal Sadeq

Proposed method of factorization analysis to break the RSA algorithm \

Author: Al-Hamami, Alaa

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Web application security of E-Money transfer systems \

A method for improving the Bluetooth key exchange security /

Developing a robust digital image watermark by using frequency and spatial domains \

Enhanced Method for RSA cryptoststem algorithm \

Investigating distributed database deadlock based on attribute level \

Estimation of null value in relational data base system using K-nearest neighbor and decision tree \

Proposed method of factorization analysis to break the RSA algorithm \

Improving the watermarking performance using combined redundant discrete wavelet transform and contourlet transform scheme \

Discover Knowledge with Imam University's Digital Discovery Portal

Access thousands of academic resources, research materials, and scholarly publications

Start Exploring Now
Imam University Team
Imam University Logo

Imam Muhammad Ibn Saud Islamic University

Riyadh, Kingdom of Saudi Arabia
+966 11 259 5000
info@imamu.edu.sa

Resources

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items
  • Educational resources
  • ImamU API

Search & Help

  • Basic search
  • Advanced search
  • Search history
  • Feedback
  • Search Tips
  • Ask a Librarian
  • Help
  • FAQs
  • Service level agreement
  • End User Agreement

Connect With Us

© 2026 Imam Muhammad Ibn Saud Islamic University. All rights reserved.

VuFind