Data Encryption
481 Followers
Recent papers in Data Encryption
AbstractQuantum computing offers immense speedup in performing tasks such as data encryption and searching. The quantum algorithms can be modeled using classical computing devices, however classical computer simulations cannot deal... more
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a... more
Multi-player online games (MOGs) have become increasingly popular on today’s Internet. Meanwhile, the IEEE 802.11 (Wi-Fi) wireless networks have been widely used. We study how well an underlying 802.11g network supports a... more
It is not secret that the algorithms and methods used to encrypt messages in Arabic language are few and old, there are no modern encryption algorithms to encrypt the Arabic letters along the lines as the encryption algorithms of the... more
This paper introduces a real-time data compression and transmission algorithm between e-health terminals for a periodic ECGsignal. The proposed algorithm consists of five compression procedures and four reconstruction procedures. In order... more
This article provides a general introduction to the subject of Cryptology, Crytography and Crytoanalysis and explains the terminology and the practical application of security techniques… In recorded History , technological innovations... more
Page 1. Symmetric Cryptosystem Based on Data Encryption Standard Integrating HMAC and Digital Signature Scheme Implemented in Multi-Cast Messenger Application Don Jomar S. Hombrebueno Ma. Gracia Corazon E. Sicat Jasmin D. Niguidula Enrico... more
In this paper, we propose a novel, secure, and intelligent IoT approach based on agent, we have implemented in the health care domain, where we developed an intelligent patient monitoring system for monitoring the patients heart rate... more
The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. However, a drawback of this algorithm is that the inverse of the matrix used for encrypting the plaintext does not always... more
The stream cipher A5/2 is used in GSM (Global System for mobile Communication) for authentication and data encryption. There have been numerous successful attacks that were launched on A5/2 hence breaking down its security. In this paper... more
With the major advancements in the field of technology and electronics, one persistent obstacle has proven to be one of the major challenges, namely : Data Security. To get connected securely and quickly through the electronic data... more
This article provides a general introduction to the subject of Cryptology, Crytography and Crytoanalysis and explains the terminology and the practical application of security techniques… In recorded History , technological innovations... more
With the major advancements in the field of technology and electronics, one persistent obstacle has proven to be one of the major challenges, namely : Data Security. To get connected securely and quickly through the electronic data... more
With the increasing of the online applications and aggravation of dealing with official papers via the Internet that is send by images. It has become very necessary to add ways to make sure of the reliability of the transmitted image. The... more
NTRU is being considered as part of the NIST quantum resistant cryptography standard. While NIST has received substantial attention in the literature, more analysis is needed. This current study uses a unique approach. The team of... more
The increase in number of smartphones and their applications generates new demands. Smartphones require a higher level of processing power and computation capability. Mobile devices use batteries so their capacity is limited and wireless... more
In computer networking, the Media Access Control (MAC) address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. TCP/IP and other mainstream networking... more
This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic... more
In this paper, an efficient and scalable technique for computer network security is presented. On one hand, the decryption scheme and the public key creation used in this work are based on a multi-layer neural network that is trained by... more
In this paper we encrypt textual data with symmetric key cryptography based on irrational numbers, an improved scheme that enhances the randomness of sub-Key is proposed, in which the permutation is controlled by irrational number. DES... more
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality. The privacy of health data can only be preserved by keeping it in an... more
This paper presents a novel authentication and encryption method for an RFID system. In this paper, DES (Data Encryption Standard), algorithm will be used to encrypt and verify accuracy data within an RFID tag. The new DES algorithm use... more