[Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E‐Commerce Websites
Providing security for transmitted data through the e‐commerce environment requires using
a fast and high secure encryption algorithm. Balancing between the speed and the security …
a fast and high secure encryption algorithm. Balancing between the speed and the security …
Modified symmetric image encryption approach based on mixed column and substitution box
V Sawant, A Solkar, R Mangrulkar - Journal of Applied Security …, 2024 - Taylor & Francis
Internet a network of interconnected systems which is used to transmit different kinds of
sensitive data is made secure by encrypting this data during transmission and protecting it …
sensitive data is made secure by encrypting this data during transmission and protecting it …
[PDF][PDF] A Secure E-commerce Environment Using Multi-agent System.
Providing security for the customers in the e-commerce system is an essential issue.
Providing security for each single online customer at the same time is considered a time …
Providing security for each single online customer at the same time is considered a time …
[PDF][PDF] Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
This paper proposes a new encryption method. It combines two cipher algorithms, ie, DES
and AES, to generate hybrid keys. This combination strengthens the proposed W-method by …
and AES, to generate hybrid keys. This combination strengthens the proposed W-method by …
An innovative method for enhancing advanced encryption standard algorithm based on magic square of order 6
This paper introduces an improved advanced encryption standard (AES) cipher algorithm by
proposing a new algorithm based on magic square to decrease the AES execution time …
proposing a new algorithm based on magic square to decrease the AES execution time …
Double Diagonal Puzzle Encryption Standard-512 for Securing Data over Cloud Environment
QW Ahmed, S Garg - Journal of Grid Computing, 2022 - Springer
The ever-increasing use of cloud computing and services has raised questions of securely
accessing data. Security concernsare a significant hurdle to storing large-scale data in the …
accessing data. Security concernsare a significant hurdle to storing large-scale data in the …
Securing data over cloud–enhanced hybrid data encryption algorithm
PK Mahapatra, AR Tripathy… - Journal of Information and …, 2022 - Taylor & Francis
Cloud computing became popular due to its elasticity, unparalleled resource availability on
demand and almost zero downtime. Looking into the advantages of cloud computing …
demand and almost zero downtime. Looking into the advantages of cloud computing …
[PDF][PDF] Word-based encryption algorithm using dictionary indexing with variable encryption key length
This paper proposes a new algorithm for text encryption utilizing English words as a unit of
encoding. The algorithm vanishes any feature that could be used to reveal the encrypted text …
encoding. The algorithm vanishes any feature that could be used to reveal the encrypted text …
Maximizing blockchain security: Merkle tree hash values generated through advanced vectorized elliptic curve cryptography mechanisms
DM Sharma, SK Shandilya… - … Practice and Experience, 2023 - Wiley Online Library
Cloud computing is considered as the most fabulous paradigm to accommodate various
kinds of user information. However, the privacy conflicts integrated with computational …
kinds of user information. However, the privacy conflicts integrated with computational …
ANALYSIS AND IMPLEMENTATION OF AES-128 ALGORITHM IN SUKAHARJA KARAWANG VILLAGE SERVICE SYSTEM
Data security in databases is needed in the industrial era 4.0 to prevent attacks and
unwanted things from happening, one of the biggest cases that has been widely reported is …
unwanted things from happening, one of the biggest cases that has been widely reported is …