The International Arab Journal of Information Technology (IAJIT)

A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes

Abstract: Hash functions are the most widespread among all cr yptographic primitives, and are currently used in multiple

Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems

integrity  for  flexible  and  traditional  remote  syste ms.  SIMS  is  not  only  targeted  for  Linux,  but  it  can   also  be  used  for  different 

Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve

University, Jordan 3Department of Information Technology, Al-Balqa Applied University, Jordan

A Novel Secure Hash Algorithm for Public Key Digital Signature Schemes

Abstract: Hash functions are the most widespread among all cr yptographic primitives, and are currently used in multiple

Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems

integrity  for  flexible  and  traditional  remote  syste ms.  SIMS  is  not  only  targeted  for  Linux,  but  it  can   also  be  used  for  different