{"id":47825,"date":"2023-07-10T22:50:34","date_gmt":"2023-07-10T19:50:34","guid":{"rendered":"https:\/\/spu.edu.iq\/ku\/?p=47825"},"modified":"2024-06-10T11:56:42","modified_gmt":"2024-06-10T08:56:42","slug":"%d8%aa%d9%88%db%8e%da%98%db%8c%d9%86%db%95%d9%88%db%95%db%8c%db%95%da%a9%db%8c-%d9%87%d8%a7%d9%88%d8%a8%db%95%d8%b4%db%8c-%d8%af%d9%88%d9%88%d9%85%d8%a7%d9%85%db%86%d8%b3%d8%aa%d8%a7%db%8c-%da%a9","status":"publish","type":"post","link":"https:\/\/spu.edu.iq\/ku\/?p=47825","title":{"rendered":"\u062a\u0648\u06ce\u0698\u06cc\u0646\u06d5\u0648\u06d5\u06cc\u06d5\u06a9\u06cc \u0647\u0627\u0648\u0628\u06d5\u0634\u06cc \u062f\u0648\u0648\u0645\u0627\u0645\u06c6\u0633\u062a\u0627\u06cc \u06a9\u06c6\u0644\u06ce\u062c\u06cc \u062a\u06d5\u06a9\u0646\u06cc\u06a9\u06cc \u06a9\u06d5\u0644\u0627\u0631 \u0628\u06b5\u0627\u0648\u06a9\u0631\u0627\u06cc\u06d5\u0648\u06d5"},"content":{"rendered":"\n<p>\u062a\u0648\u06ce\u0698\u06cc\u0646\u06d5\u0648\u06d5\u06cc\u06d5\u06a9\u06cc \u0647\u0627\u0648\u0628\u06d5\u0648\u0634\u06cc \u0647\u06d5\u0631\u06cc\u06d5\u06a9 \u0644\u06d5 \u0633\u06c6\u0631\u0627\u0646  \u0639\u0628\u062f\u0627\u0644\u06a9\u0631\u06cc\u0645 \u067e\u0627\u0634\u0627\u060c \u0626\u06d5\u0631\u06a9\u0627\u0646 \u0639\u0628\u062f\u0627\u0644\u062c\u0628\u0627\u0631 \u0635\u0641\u0631 \u0645\u0627\u0645\u06c6\u0633\u062a\u0627 \u0644\u06d5\u0628\u06d5\u0634\u06cc \u062a\u06d5\u06a9\u0646\u06d5\u0644\u06c6\u062c\u06cc\u0627\u06cc \u0632\u0627\u0646\u06cc\u0627\u0631\u06cc  \u06a9\u06c6\u0644\u06ce\u062c\u06cc \u062a\u06d5\u06a9\u0646\u06cc\u06a9\u06cc \u06a9\u06d5\u0644\u0627\u0631 \u0628\u06d5\u06be\u0627\u0648\u0628\u06d5\u0634\u06cc \u0645\u0627\u0645\u06c6\u0633\u062a\u0627\u06cc\u06d5\u06a9\u06cc \u0632\u0627\u0646\u06a9\u06c6\u06cc \u06af\u06d5\u0631\u0645\u06cc\u0627\u0646 \u0628\u06d5\u0646\u0627\u0648\u06ccLIGHTWEIGHT CRYPTOGRAPHY METHOD IN THE INTERNET OF USING ELLIPTIC CURVE AND CROW SEARCH ALGORITHM\u0628\u06b5\u0627\u0648\u0628\u06a9\u0631\u0627\u06cc\u06d5\u0648\u06d5\u060c\u062a\u0648\u06ce\u0698\u0646\u06d5\u0648\u06d5\u06a9\u06d5 \u0628\u0627\u0633 \u0644\u06d5\u06af\u0648\u0627\u0633\u062a\u0646\u06d5\u0648\u06d5\u06cc \u062f\u0627\u062a\u0627 \u062f\u06d5\u06a9\u0627\u062a \u0644\u06d5\u0631\u06ce\u06af\u0627\u06cc \u0626\u06cc\u0646\u062a\u06d5\u0631\u0646\u06ce\u062a\u06d5\u0648\u06d5 \u0628\u06d5\u0634\u06ce\u0648\u06d5\u06cc\u06d5\u06a9\u06cc \u0633\u06d5\u0644\u0627\u0645\u06d5\u062a \u0648 \u067e\u0627\u0631\u06ce\u0632\u0631\u0627\u0648 \u0644\u06d5\u0646\u06ce\u0631\u062f\u06d5\u0631\u06d5\u0648\u06d5 \u0628\u06c6 \u0648\u06d5\u0631\u06af\u0631\u060c \u0628\u06c6 \u0626\u06d5\u0648\u06d5\u06cc \u0644\u06d5\u0631\u06ce\u06af\u0627\u062f\u0627 \u062f\u0627\u062a\u0627\u06a9\u0627\u0646 \u0644\u06d5\u0646\u0627\u0648\u0646\u06d5\u0686\u0646 \u06cc\u0627\u0646 \u062f\u06d5\u0633\u062a\u06cc \u0628\u06d5\u0633\u06d5\u0631\u062f\u0627 \u0646\u06d5\u06af\u06cc\u0631\u06ce \u0628\u06d5\u062c\u06c6\u0631\u06ce\u06a9 \u062f\u0627\u062a\u0627\u06a9\u0627\u0646 encrypt \u062f\u06d5\u06a9\u0631\u06ce\u062a \u0628\u06d5\u0633\u0648\u0648\u062f \u0648\u06d5\u0631\u06af\u0631\u062a\u0646 \u0644\u06d5 \u0626\u06d5\u0644\u06af\u06c6\u0631\u06cc\u0633\u0645\u06cc crow search (CSA), ECC and Secure Hash Algorithm 256.\u0626\u06d5\u0648 \u06a9\u0648\u0631\u062a\u06d5 \u0628\u0627\u0633\u06d5\u06cc \u062a\u0648\u06ce\u0698\u06cc\u0646\u06d5\u0648\u06d5\u06a9\u06d5 \u0644\u06d5\u0686\u0648\u0627\u0631\u0686\u06ce\u0648\u06d5\u06cc \u0686\u06d5\u0645\u06a9\u06ce\u06a9\u06cc \u0646\u0648\u06ce\u06cc \u062c\u06cc\u06be\u0627\u0646\u06cc\u06cc\u06d5 \u0644\u06d5\u0628\u0648\u0627\u0631\u06cc \u062a\u06d5\u06a9\u0646\u06d5\u0644\u06c6\u062c\u06cc\u0627 \u0648 \u067e\u06d5\u06cc\u0648\u06d5\u0646\u062f\u06cc\u06cc\u06d5\u06a9\u0627\u0646 \u06a9\u06d5\u0628\u062a\u0648\u0627\u0646\u0631\u06ce\u062a \u0644\u06d5\u0631\u06ce\u06af\u0627\u06cc\u06d5\u0648\u06d5 \u062f\u0627\u062a\u0627 \u0628\u0646\u06ce\u0631\u062f\u0631\u06ce \u067e\u06ce\u06cc \u062f\u06d5\u0648\u062a\u0631\u06ce\u062a Internet of Thing (IoT) \u0644\u06cc\u0646\u06a9\u06cc \u062a\u0648\u06ce\u0698\u06cc\u0646\u06d5\u0648\u06d5\u06a9\u06d5 \ud83d\udc47https:\/\/sjuoz.uoz.edu.krd\/index.php\/sjuoz\/article\/view\/1055\/652<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>\u062a\u0648\u06ce\u0698\u06cc\u0646\u06d5\u0648\u06d5\u06cc\u06d5\u06a9\u06cc \u0647\u0627\u0648\u0628\u06d5\u0648\u0634\u06cc \u0647\u06d5\u0631\u06cc\u06d5\u06a9 \u0644\u06d5 \u0633\u06c6\u0631\u0627\u0646 \u0639\u0628\u062f\u0627\u0644\u06a9\u0631\u06cc\u0645 \u067e\u0627\u0634\u0627\u060c \u0626\u06d5\u0631\u06a9\u0627\u0646 \u0639\u0628\u062f\u0627\u0644\u062c\u0628\u0627\u0631 \u0635\u0641\u0631 \u0645\u0627\u0645\u06c6\u0633\u062a\u0627 \u0644\u06d5\u0628\u06d5\u0634\u06cc \u062a\u06d5\u06a9\u0646\u06d5\u0644\u06c6\u062c\u06cc\u0627\u06cc \u0632\u0627\u0646\u06cc\u0627\u0631\u06cc \u06a9\u06c6\u0644\u06ce\u062c\u06cc \u062a\u06d5\u06a9\u0646\u06cc\u06a9\u06cc \u06a9\u06d5\u0644\u0627\u0631 \u0628\u06d5\u06be\u0627\u0648\u0628\u06d5\u0634\u06cc \u0645\u0627\u0645\u06c6\u0633\u062a\u0627\u06cc\u06d5\u06a9\u06cc \u0632\u0627\u0646\u06a9\u06c6\u06cc \u06af\u06d5\u0631\u0645\u06cc\u0627\u0646 \u0628\u06d5\u0646\u0627\u0648\u06ccLIGHTWEIGHT CRYPTOGRAPHY METHOD IN THE INTERNET OF USING ELLIPTIC CURVE AND CROW SEARCH ALGORITHM\u0628\u06b5\u0627\u0648\u0628\u06a9\u0631\u0627\u06cc\u06d5\u0648\u06d5\u060c\u062a\u0648\u06ce\u0698\u0646\u06d5\u0648\u06d5\u06a9\u06d5 \u0628\u0627\u0633 \u0644\u06d5\u06af\u0648\u0627\u0633\u062a\u0646\u06d5\u0648\u06d5\u06cc \u062f\u0627\u062a\u0627 \u062f\u06d5\u06a9\u0627\u062a \u0644\u06d5\u0631\u06ce\u06af\u0627\u06cc &hellip; <\/p>\n","protected":false},"author":87,"featured_media":47854,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rs_blank_template":"","rs_page_bg_color":"","slide_template_v7":"","footnotes":""},"categories":[87],"tags":[],"class_list":["post-47825","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-87"],"_links":{"self":[{"href":"https:\/\/spu.edu.iq\/ku\/index.php?rest_route=\/wp\/v2\/posts\/47825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/spu.edu.iq\/ku\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/spu.edu.iq\/ku\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/spu.edu.iq\/ku\/index.php?rest_route=\/wp\/v2\/users\/87"}],"replies":[{"embeddable":true,"href":"https:\/\/spu.edu.iq\/ku\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=47825"}],"version-history":[{"count":4,"href":"https:\/\/spu.edu.iq\/ku\/index.php?rest_route=\/wp\/v2\/posts\/47825\/revisions"}],"predecessor-version":[{"id":58546,"href":"https:\/\/spu.edu.iq\/ku\/index.php?rest_route=\/wp\/v2\/posts\/47825\/revisions\/58546"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/spu.edu.iq\/ku\/index.php?rest_route=\/wp\/v2\/media\/47854"}],"wp:attachment":[{"href":"https:\/\/spu.edu.iq\/ku\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=47825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/spu.edu.iq\/ku\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=47825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/spu.edu.iq\/ku\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=47825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}