Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   20  
      OpticsBiomedical EngineeringPhotochemistryComputer Security
    • by 
    •   24  
      Electrical EngineeringFinite Element MethodsFPGAFinite element method
    • by 
    •   10  
      Cognitive ScienceComputer ScienceAccess ControlData Management
Abstract—Quantum computing offers immense speedup in performing tasks such as data encryption and searching. The quantum algorithms can be modeled using classical computing devices, however classical computer simulations cannot deal... more
    • by 
    •   9  
      Digital CircuitsField-Programmable Gate ArraysProbabilityComputer Simulation
    • by 
    •   20  
      AlgorithmsGeriatricsBiomedical EngineeringSignal Processing
    • by 
    •   34  
      Information SystemsNeuroscienceCognitive ScienceElectrophysiology
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a... more
    • by 
    •   16  
      Computer ScienceInformation SecurityCryptographyPerformance Analysis
Multi-player online games (MOGs) have become increasingly popular on today’s Internet. Meanwhile, the IEEE 802.11 (Wi-Fi) wireless networks have been widely used. We study how well an underlying 802.11g network supports a... more
    • by 
    •   8  
      Video StreamingWireless NetworkNetwork PerformanceOnline Game
It is not secret that the algorithms and methods used to encrypt messages in Arabic language are few and old, there are no modern encryption algorithms to encrypt the Arabic letters along the lines as the encryption algorithms of the... more
    • by 
    •   5  
      Computer ScienceCryptographyEncryptionData Encryption
This paper introduces a real-time data compression and transmission algorithm between e-health terminals for a periodic ECGsignal. The proposed algorithm consists of five compression procedures and four reconstruction procedures. In order... more
    • by 
    •   24  
      AlgorithmsGeriatricsBiomedical EngineeringSignal Processing
This article provides a general introduction to the subject of Cryptology, Crytography and Crytoanalysis and explains the terminology and the practical application of security techniques… In recorded History , technological innovations... more
    • by 
    •   18  
      Computer ScienceInformation SecurityInformation Security AuditingEncryption
    • by 
    •   11  
      FPGAComplex SystemSoftware DesignData Communication
Page 1. Symmetric Cryptosystem Based on Data Encryption Standard Integrating HMAC and Digital Signature Scheme Implemented in Multi-Cast Messenger Application Don Jomar S. Hombrebueno Ma. Gracia Corazon E. Sicat Jasmin D. Niguidula Enrico... more
    • by 
    •   8  
      Information SecurityDigital SignatureCryptographyKey Management
    • by 
    •   11  
      Information SecurityCryptographyEncryptionLinear Algebra
In this paper, we propose a novel, secure, and intelligent IoT approach based on agent, we have implemented in the health care domain, where we developed an intelligent patient monitoring system for monitoring the patients heart rate... more
    • by 
    •   20  
      Computer ScienceArtificial IntelligenceStructural Health MonitoringHealth
The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. However, a drawback of this algorithm is that the inverse of the matrix used for encrypting the plaintext does not always... more
    • by 
    •   2  
      Computational ComplexityData Encryption
    • by 
    •   2  
      Public DomainData Encryption
The stream cipher A5/2 is used in GSM (Global System for mobile Communication) for authentication and data encryption. There have been numerous successful attacks that were launched on A5/2 hence breaking down its security. In this paper... more
    • by 
    •   6  
      Computer ScienceComputer SecurityCryptographyData Security
With the major advancements in the field of technology and electronics, one persistent obstacle has proven to be one of the major challenges, namely : Data Security. To get connected securely and quickly through the electronic data... more
    • by 
    •   9  
      CryptographyEncryptionData SecurityScientific Publications
    • by 
    •   4  
      Computer ScienceData EncryptionData TypeStream Cipher
    • by 
    •   10  
      Digital SignatureJava ProgrammingJava CardSmart Card
This article provides a general introduction to the subject of Cryptology, Crytography and Crytoanalysis and explains the terminology and the practical application of security techniques… In recorded History , technological innovations... more
    • by 
    •   18  
      Information SecurityInformation Security AuditingEncryptionInformation Security and Privacy
With the major advancements in the field of technology and electronics, one persistent obstacle has proven to be one of the major challenges, namely : Data Security. To get connected securely and quickly through the electronic data... more
    • by 
    •   8  
      CryptographyEncryptionData SecurityRSA
    • by 
    •   2  
      Cyber SecurityData Encryption
With the increasing of the online applications and aggravation of dealing with official papers via the Internet that is send by images. It has become very necessary to add ways to make sure of the reliability of the transmitted image. The... more
    • by 
    •   6  
      Computer ScienceInformation SecurityImage EncryptionData Encryption
    • by 
    •   5  
      ModulesAjaxData EncryptionUnit Testing
NTRU is being considered as part of the NIST quantum resistant cryptography standard. While NIST has received substantial attention in the literature, more analysis is needed. This current study uses a unique approach. The team of... more
    • by 
    •   18  
      Mathematics of CryptographyCryptographyQuantum CryptographyEncryption
This paper presents a 128-bit approach on the outdated Data Encryption Standard cipher. Since the symmetric block cipher is well past its prime, many methods have been devised by hackers in order to crack the cipher and obtain the... more
    • by  and +4
    •   4  
      CryptographyData EncryptionBlock CipherData Encryption Standard
The increase in number of smartphones and their applications generates new demands. Smartphones require a higher level of processing power and computation capability. Mobile devices use batteries so their capacity is limited and wireless... more
    • by 
    •   4  
      Cloud ComputingData SecurityMobile Cloud ComputingData Encryption
In computer networking, the Media Access Control (MAC) address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. TCP/IP and other mainstream networking... more
    • by 
    •   7  
      Computer ScienceInformation SecurityComputer NetworksComputer Networking and Telecommunication
    • by 
    •   8  
      Information SocietyComputers and SocietyHuman rightData Protection
    • by 
    •   12  
      Embedded SystemsCryptographyField-Programmable Gate ArraysEncryption
    • by 
    •   5  
      Quantum CryptographyQuantum Key DistributionData EncryptionCommunication Protocol
    • by 
    •   3  
      Image EncryptionData EncryptionRecent
    • by 
    •   18  
      Computer ArchitectureFPGACryptographyQuantum Cryptography
    • by 
    • Data Encryption
    • by 
    •   2  
      Data CompressionData Encryption
    • by 
    •   3  
      Computational ComplexityImage EncryptionData Encryption
This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic... more
    • by 
    •   15  
      Artificial IntelligenceNatural Language ProcessingEvolutionary algorithmsGenetic Algorithm
    • by 
    •   11  
      Open AccessWireless NetworkWireless Network SecurityData Encryption
    • by 
    •   7  
      Mathematics of CryptographyCryptographyData EncryptionCryptography Engineering
In this paper, an efficient and scalable technique for computer network security is presented. On one hand, the decryption scheme and the public key creation used in this work are based on a multi-layer neural network that is trained by... more
    • by 
    •   7  
      Computer ScienceNeural NetworkBoolean AlgebraData Encryption
In this paper we encrypt textual data with symmetric key cryptography based on irrational numbers, an improved scheme that enhances the randomness of sub-Key is proposed, in which the permutation is controlled by irrational number. DES... more
    • by 
    •   17  
      Computer ScienceInformation SecurityNetwork SecurityComputer Networks
    • by 
    •   15  
      Information SecurityCryptographyPerformance AnalysisPerformance Evaluation
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality. The privacy of health data can only be preserved by keeping it in an... more
    • by 
    •   6  
      Data EncryptionKeyword SearchPublic Key CryptosystemsSearchable Encryption
Different applications require different level of security where the scarce of resource plays effective role. In order to protect the private medical data in the internet of things (IoT) field, the search for the optimal encryption... more
    • by  and +1
    •   5  
      Health Care ManagementLight Weight CryptograhyData EncryptionInformation Security in Healthcare
    • by 
    •   3  
      Image EncryptionData EncryptionRecent
encryption
    • by 
    • Data Encryption
This paper presents a novel authentication and encryption method for an RFID system. In this paper, DES (Data Encryption Standard), algorithm will be used to encrypt and verify accuracy data within an RFID tag. The new DES algorithm use... more
    • by 
    •   7  
      RFIDEncryptionRFID Security and PrivacyInformation