Skip to content
VuFind
  • Feedback
  • Book Bag: 0 items (Full)
  • Login
    • العربية
    • الإنجليزية

Discover Knowledge Resources!

Explore our comprehensive collection of books, articles, digital media, and more

Advanced
  • OneSearch
  • Library Catalog
  • Digital Repository
  • Channels
  • Secure E-Voting system using Secure Multiparty Computation (SMC) for user data privacy /
Search for more channels:

Similar Items: Secure E-Voting system using Secure Multiparty Computation (SMC) for user data privacy /

Computer security /

Computer security : art and science /

Computer security : principles and practice /

Managing information systems security and privacy /

Foundations of computer security /

Security in computing /

Security in computing /

Anonymization of Host-Based Logs for Preserving Data Privacy and Security Monitoring Utility /

Computer security : principles and practice /

Computer security : principles and practice /

Computer and information security handbook /

Web services security and e-business /

Pervasive information security and privacy developments : trends and advancements /

Principles of data security /

Data Warehousing and Data Mining Techniques for Cyber Security /

Principles of computer security : Security+ TM and beyond /

Privacy and access to government data for research : an international bibliography /

Investigative data mining for security and criminal detection /

Cryptography and network security : principles and practice /

Foundations of computer science : from data manipulation to theory of computation /

Topic: Computer security

Principles of information security /

Integrating security and software engineering : advances and future visions /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Information security : principles and practice /

Encyclopedia of information ethics and security /

Information hiding technique in digital image using transform domain \

Foundations of computer science : from data manipulation to theory of computation /

Network security : private communication in a public world /

Bi-directional transition mechanism between IPv4 and IPv6 \

The art of software security assessment : identifying and preventing software vulnerabilities /

Risk Assessment in Cyber-Physical System /

Foundations of computer security /

Information security fundamentals /

A method for improving the Bluetooth key exchange security /

A hybrid fingerprint identification & verification algorithm \

Computer security : principles and practice /

Information security : a strategic approach /

Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /

Information security : principles and practices /

Security in computing /

Topic: Data encryption (Computer science)

  • Topic: Management information systems

Developing a Performance-based Tool for Arabic Text Steganography /

Understanding the Acceptance of Fingerprint-Based Authentication for E-payment Based on Extended Valence Framework /

A Framework and IoT-based Accident Detection System to Securely Report Accident and Driver's Private Information /

Statistical Text Steganography for Arabic Language Using Markov Chains /

Secure E-Voting system using Secure Multiparty Computation (SMC) for user data privacy /

Author: Almalki, Ghadah Abdullah

Secure E-Voting system using Secure Multiparty Computation (SMC) for user data privacy /

Author: Aljumah, Feras

Secure E-Voting system using Secure Multiparty Computation (SMC) for user data privacy /

Discover Knowledge with Imam University's Digital Discovery Portal

Access thousands of academic resources, research materials, and scholarly publications

Start Exploring Now
Imam University Team
Imam University Logo

Imam Muhammad Ibn Saud Islamic University

Riyadh, Kingdom of Saudi Arabia
+966 11 259 5000
info@imamu.edu.sa

Resources

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items
  • Educational resources
  • ImamU API

Search & Help

  • Basic search
  • Advanced search
  • Search history
  • Feedback
  • Search Tips
  • Ask a Librarian
  • Help
  • FAQs
  • Service level agreement
  • End User Agreement

Connect With Us

© 2026 Imam Muhammad Ibn Saud Islamic University. All rights reserved.

VuFind