Skip to main content
Folios 1v-6r of the Voynich Manuscript, a mysterious codex that was written in an unknown language during the 15th or 16th century, contains various illustrations of plants, and these diagrams offer valuable clues about the text and its... more
    • by  and +3
    •   12  
      AlgorithmsLanguages and LinguisticsMachine LearningMediterranean Studies
Most computer systems are currently being integrated into networks. The purpose of integrating a computer system into a network is to make it more effective and easy to access. Various data and information are usually stored within a file... more
    • by 
    •   3  
      CryptographyEncryptionPretty Good Privacy
In this paper an analysis of the existing video information protection methods is made. Analysis of current H.323 protocol stack has been made. A new encryption/decryption layer has been suggested. An approach for partial data encryption... more
    • by 
    •   6  
      Computer ScienceInformation TechnologyVideoCryptography
    • by 
    •   12  
      Mechanical EngineeringComputer ScienceOpticsEncryption
Modern networks have critical security needs and a suitable level of protection and performance is usually achieved with the use of dedicated hardware cryptographic cores. Although the Advanced Encryption Standard (AES) is considered the... more
    • by 
    •   6  
      Computer ScienceComputer HardwareEncryptionIntegration
A type of distributed and self-regulating network is the wireless sensor network (WSN). The sensor nodes have limited computing capabilities, memory, battery power are needed to ensure a strong security design. In this paper, an adaptive... more
    • by 
    •   5  
      SecurityEncryptionWsnRSA ALGORITHM
With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and... more
    • by 
    •   20  
      AlgorithmsBiomedical EngineeringData CompressionComputer Security
Data is a most valuable part of most of nowadays system. A lot of hackers and criminals are trying to steal this data all the time. Due to that data should also be the best protected part of every company's systems. We would like our... more
    • by 
    •   2  
      Computer ScienceEncryption
Database security is a growing concern as the amount of sensitive data collected and retained in databases is fast growing and most of these data are being made accessible via the internet. Majority of the companies, organizations and... more
    • by 
    •   12  
      Materials ScienceDatabase SystemsAcademic IntegrityTheory Of Mechanisms
In this paper we consider a chosen-plaintext variant of the linear attack on DES introduced by Matsui. By choosing plaintexts in a clever way one can reduce the number of plaintexts required in a successful linear attack. This reduces the... more
    • by 
    •   5  
      CryptographyEncryptionCryptanalysisText
This paper is on RSA Encryption Tables.
    • by 
    •   2  
      EncryptionEncryption Algorithms
    • by 
    •   9  
      EncryptionAlgorithmNetworkEncoding
In the 21st century, we have plenty of data available in the society of education. Importantly, today's education system has changed, it takes place through all the available channels and one of the significant means is the digital... more
    • by 
    •   6  
      Information SecurityE-learningComputer SecurityCryptography
    • by 
    •   11  
      Computer ScienceModelingComputer SecurityCryptography
Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user... more
    • by 
    •   10  
      Computer SciencePublic Key InfrastructureEncryptionSMS
Encryption algorithms provide the securely transmitted data over insecure communication channels. In this paper a different stream cipher scheme is presented which is very simple in hardware implementation and provides relatively high... more
    • by  and +1
    •   13  
      Computer ScienceAlgorithmsInformation TechnologyOptometry
A previously unknown form of compromising emanations has been discovered. LED status indicators on data communication equipment, under certain conditions, are shown to carry a modulated optical signal that is significantly correlated with... more
    • by 
    •   9  
      Information SystemsCommunicationFiber OpticsEncryption
This work proposes a novel reversible data hiding scheme for encrypted image. After encrypting the entire data of an uncompressed image by a stream cipher, the additional data can be embedded into the image by modifying a small proportion... more
    • by 
    •   11  
      Data MiningWatermarkingCryptographyEncryption
Today almost all organizations have improved their performance through allowing more information exchange within their organization as well as between their distributers, suppliers, and customers using web support. Databases are central... more
    • by 
    •   12  
      Static AnalysisEncryptionDatabasesSecurity Engineering
Security and efficiency of transferred data is the main concern in big data and cloud computing service. Fully Homomorphic Encryption is one of the most recent solutions that ensure the security and confidently. This paper expected to... more
    • by  and +2
    •   2  
      EncryptionHomomorphic Encryption
    • by 
    •   12  
      Computer ScienceCryptographyEncryptionSecurity Management
Encryption is the de facto method for protecting information, whether this information is locally stored or on transit. Although we have many encryption techniques, they have problems inherited from the computational models that they use.... more
    • by 
    •   6  
      Computer ScienceComputer SecurityEncryptionSymmetry
Non-governmental organizations (NGOs) in underdeveloped countries are receiving funds from donor agencies for various purposes, including relief from natural disasters and other emergencies, promoting education, women empowerment,... more
    • by 
    •   4  
      Information SecurityComputer SecurityEncryptionBlockchains
Cryptography and encryption have been used for secure communication. In the modern world, cryptography is a very important tool for protecting information in computer systems. With the invention of the World Wide Web or Internet, computer... more
    • by 
    •   5  
      Network SecurityCryptographyEncryptionData Security
Decentralized attribute-based encryption (ABE) is a variant of a multiauthority ABE scheme where each authority can issue secret keys to the user independently without any cooperation and a central authority. This is in contrast to the... more
    • by 
    •   11  
      Distributed ComputingPrivacyCryptographyEncryption
Communication techniques have witnessed rapid development in recent years, especially the internet and the mobile network, which led to rapid data transmission. The latest developments, in turn, have come out with advanced decisions to... more
    • by  and +1
    •   3  
      SecurityEncryptionChaotic System
There exist numerous kinds of cryptographic structures. In symmetric cryptography, both sending and receiving events share the identical secret key. While symmetric cryptography is computationally green, it requires that the shared secret... more
    • by 
    •   16  
      MathematicsMathematics of CryptographyComputer ScienceAlgorithms
Most prior designated confirmer signature schemes either prove security in the random oracle model (ROM) or use general zero-knowledge proofs for NP statements (making them impractical). By slightly modifying the definition of designated... more
    • by 
    •   8  
      Digital SignatureModelingCryptographyEncryption
Cryptography, Steganography and Digital watermarking are widely used for Image Encryption and Textual Data Encryption and also we have various classification of these techniques. In this paper we study of Hybrid Cryptographic Encryption... more
    • by 
    •   22  
      Information SystemsElectronic EngineeringMathematics of CryptographyComputer Science
In this paper, two image encryption schemes are proposed for grayscale and color images. The two encryption schemes are based on dividing each image into blocks of different sizes. In the first scheme, the two dimension (2D) input image... more
    • by 
    •   3  
      Computer ScienceEncryptionGrayscale
Hiding Capacity plays a vital role for efficient covert communication. This is achieved by Steganography. Steganography is the science of hiding the information into the other information so that the hidden information appears to be... more
    • by 
    •   3  
      EncryptionSteganographyTransform Domain Watermarking
In this era of information technology and e-commerce security is the key aspect while transmitting confidential information over insecure network like internet. In order to protect the information, various security mechanisms are used.... more
    • by 
    •   11  
      Applied CryptographyCryptographyEncryptionCryptology
    • by  and +1
    •   16  
      EngineeringTechnologyImage ProcessingSignal Processing
At the start of the 21 st century, the National Institute of Standards and Technology (NIST) began the task of providing cryptographic key management guidance, which includes defining and implementing appropriate key management... more
    • by 
    •   8  
      Information SecurityComputer SecurityCryptographyEncryption
With the massive number of e-Commerce and websites becoming the target of hackers’ attacks in recent years, threats that are commonly targeting web applications include SQL Injection and data theft. Designing, establishing, and... more
    • by 
    •   7  
      Computer ScienceComputer SecurityEncryptionData Security
It is not secret that the algorithms and methods used to encrypt messages in Arabic language are few and old, there are no modern encryption algorithms to encrypt the Arabic letters along the lines as the encryption algorithms of the... more
    • by 
    •   5  
      Computer ScienceCryptographyEncryptionData Encryption
Over the years, millions of data and information in transit have been abused, compromised or lost to cybercriminals/hackers due to inefficient security measures adopted during data transmission. To address this issue this paper reviewed... more
    • by 
    •   6  
      Information SecurityEmbedded SoftwareCryptographyEncryption
Organizations and individuals have been moving to the cloud computing technology looking for effective and fast computing services. Confidential information is becoming more vulnerable to leak due to outsource computations to... more
    • by 
    •   7  
      Genetic AlgorithmsCryptographyEncryptionConfidentiality
We propose a novel architecture for adaptive encryption of public cloud databases that offers an interesting alternative to the trade-off between the required data confidentiality level and the flexibility of the cloud database structures... more
    • by 
    •   8  
      Computer ArchitectureEncryptionDatabasesEstimation
Information technologies are changing every aspect of human life day by day. In this context, Edge Computing, Internet of Things, Machine Learning and Big Data Analytics technologies are thought to be a part of this change. Edge computing... more
    • by 
    •   8  
      Computer ScienceComputer NetworksCryptographyEncryption
Fear of security breaches has been a major reason for the business world's reluctance to embrace the Internet as a viable means of communication. A widely adopted solution consists of physically separating private networks from the rest... more
    • by 
    •   20  
      EngineeringComputer ScienceTechnologyNetwork Security
An enhanced technique of color image encryption based on random matrix key encoding is proposed. To encrypt the color image a separation into Red Green and Blue (R, G, B) channels will applied. Each channel is encrypted using a technique... more
    • by 
    •   17  
      Computer ScienceInformation TechnologyInformation Communication TechnologyEncryption
Users nowadays have several web accounts for email, banking, blogging, social media, online shopping, and other services. The choice of passwords for these different web accounts poses a problem, resulting in a dilemma. Since users tend... more
    • by 
    •   5  
      EncryptionHashingThreatsSpoofing
Abstract — Genetic algorithm based Cryptanalysis has gained considerable attention due to its fast convergence time. This paper proposes a Genetic Algorithm (GA) based cryptanalysis scheme for breaking the key employed in Simplified- AES.... more
    • by 
    •   12  
      Computer ScienceInformation TechnologyInformation SecurityGenetic Algorithms
With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. Data security is the utmost critical issue in ensuring safe... more
    • by 
    •   20  
      Mathematics of CryptographyComputer ScienceComputer EngineeringMobile Ad Hoc Networks
The value added taxes (VATs) of the East African Community (EAC) are open to manipulation and are leaking revenue from tradable services transactions. The EAC’s response has been to adopt a unique Reverse VAT mechanism. Something more is... more
    • by  and +1
    •   6  
      TaxationFraud Detection And PreventionEncryptionTax Evasion
Security is the level of confidentiality of data stored using cryptography. There are many ways you can do to improve security. In this study, the writer will use a method by encrypting the database with the Caesar Cipher Algorithm, Hill... more
    • by 
    •   3  
      Computer ScienceEncryptionCipher
We live in the era of information explosion and have witnessed the trend of leveraging cloud-based services for large scale content storage, processing, and distribution. Data security and privacy are among top concerns for any business... more
    • by 
    •   8  
      Computer ScienceCellular AutomataEncryptionImage Encryption
Data base security is the mechanisms that protect the data base against intentional or accidental threats. It is also a specialty within the broader discipline of computer security using encryption techniques. Encryption is one of the... more
    • by 
    •   6  
      Computer ScienceInformation SecurityEncryptionDatabase Security