[Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E‐Commerce Websites

FT Abdul Hussien, AMS Rahma… - Security and …, 2021 - Wiley Online Library
Providing security for transmitted data through the e‐commerce environment requires using
a fast and high secure encryption algorithm. Balancing between the speed and the security …

Modified symmetric image encryption approach based on mixed column and substitution box

V Sawant, A Solkar, R Mangrulkar - Journal of Applied Security …, 2024 - Taylor & Francis
Internet a network of interconnected systems which is used to transmit different kinds of
sensitive data is made secure by encrypting this data during transmission and protecting it …

[PDF][PDF] A Secure E-commerce Environment Using Multi-agent System.

FTA Hussien, AMS Rahma… - … Automation & Soft …, 2022 - pdfs.semanticscholar.org
Providing security for the customers in the e-commerce system is an essential issue.
Providing security for each single online customer at the same time is considered a time …

[PDF][PDF] Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms

WA Shukur, LK Qurban, A Aljuboori - Baghdad Science Journal, 2023 - iasj.net
This paper proposes a new encryption method. It combines two cipher algorithms, ie, DES
and AES, to generate hybrid keys. This combination strengthens the proposed W-method by …

An innovative method for enhancing advanced encryption standard algorithm based on magic square of order 6

SM Kareem, AMS Rahma - Bulletin of Electrical Engineering and …, 2023 - beei.org
This paper introduces an improved advanced encryption standard (AES) cipher algorithm by
proposing a new algorithm based on magic square to decrease the AES execution time …

Double Diagonal Puzzle Encryption Standard-512 for Securing Data over Cloud Environment

QW Ahmed, S Garg - Journal of Grid Computing, 2022 - Springer
The ever-increasing use of cloud computing and services has raised questions of securely
accessing data. Security concernsare a significant hurdle to storing large-scale data in the …

Securing data over cloud–enhanced hybrid data encryption algorithm

PK Mahapatra, AR Tripathy… - Journal of Information and …, 2022 - Taylor & Francis
Cloud computing became popular due to its elasticity, unparalleled resource availability on
demand and almost zero downtime. Looking into the advantages of cloud computing …

[PDF][PDF] Word-based encryption algorithm using dictionary indexing with variable encryption key length

A Al-Jarrah, A Albsharat, M Al-Jarrah - International Journal of …, 2022 - academia.edu
This paper proposes a new algorithm for text encryption utilizing English words as a unit of
encoding. The algorithm vanishes any feature that could be used to reveal the encrypted text …

Maximizing blockchain security: Merkle tree hash values generated through advanced vectorized elliptic curve cryptography mechanisms

DM Sharma, SK Shandilya… - … Practice and Experience, 2023 - Wiley Online Library
Cloud computing is considered as the most fabulous paradigm to accommodate various
kinds of user information. However, the privacy conflicts integrated with computational …

ANALYSIS AND IMPLEMENTATION OF AES-128 ALGORITHM IN SUKAHARJA KARAWANG VILLAGE SERVICE SYSTEM

FD Nugraha, KA Baihaqi, HY Novita… - Jurnal Teknik …, 2024 - jutif.if.unsoed.ac.id
Data security in databases is needed in the industrial era 4.0 to prevent attacks and
unwanted things from happening, one of the biggest cases that has been widely reported is …