Real-time encryption/decryption algorithm with a fractional chaotic system of various data: Image, speech, and text
Nowadays, a fractional-order chaotic system is commonly used in digital cryptosystem
applications due to its precision to initial conditions and their unpredictability. This paper …
applications due to its precision to initial conditions and their unpredictability. This paper …
Develo** an efficient solution to information hiding through text steganography along with cryptography
MP Uddin, M Saha, SJ Ferdousi… - … forum on strategic …, 2014 - ieeexplore.ieee.org
Now-a-days information security over unsecured communication channel is one of the most
challenging issues. Cryptography and steganography, a sub-discipline of information hiding …
challenging issues. Cryptography and steganography, a sub-discipline of information hiding …
[PDF][PDF] Lightweight Dynamic Crypto Algorithm for Next Internet Generation.
AH Al-Omari - Engineering, Technology & Applied Science …, 2019 - academia.edu
Modern applications, especially real time applications, are hungry for high-speed end-to-
end transmission which usually conflicts with the necessary requirements of confidential and …
end transmission which usually conflicts with the necessary requirements of confidential and …
[PDF][PDF] Monitoring Based Security Approach for Cloud Computing.
Accepted: 15 September 2019 Cloud Service owner manages and maintains a variety of
services for the end-users and enterprises. To provide security to user data, many security …
services for the end-users and enterprises. To provide security to user data, many security …
Double Chaining Algorithm: A secure symmetric-key encryption algorithm
Technology is a key of innovation in any aspect of this modern era. In every technology, data
becomes the most important asset to be protected. Many encryption algorithms are widely …
becomes the most important asset to be protected. Many encryption algorithms are widely …
Develo** a cryptographic algorithm based on ASCII conversions and a cyclic mathematical function
Encryption and decryption of data in an efficient manner is one of the challenging aspects of
modern computer science. This paper introduces a new algorithm for Cryptography to …
modern computer science. This paper introduces a new algorithm for Cryptography to …
A cryptographic algorithm based on ASCII and number system conversions along with a cyclic mathematical function
Data encryption and decryption in an efficient manner are the challenging aspects of
modern information theory. An efficient cryptology algorithm is introduced in this paper to …
modern information theory. An efficient cryptology algorithm is introduced in this paper to …
[PDF][PDF] DEA-RTA: A dynamic encryption algorithm for the real-time applications
The Internet and it is applications are hungry for high level of Quality of Service (QoS), and
most of the Internet applications seek to minimize packets delay, especially, the Real-Time …
most of the Internet applications seek to minimize packets delay, especially, the Real-Time …
[PDF][PDF] Map** character position based cryptographic algorithm with numerical conversionsFree GPT-4
MH Moon, AKMTI Tanim, MZ Shoykot… - … Journal of Computer …, 2020 - researchgate.net
Security of data is the challenging aspects of modern information technology. An improved
cryptology algorithm is introduced in this paper to offer comparatively higher security. We …
cryptology algorithm is introduced in this paper to offer comparatively higher security. We …
[PDF][PDF] A Real-Time Encryption Algorithm For User Data Preservation In Mobile Computing
More recently, many businesses are sending real-time Application (RTA) on the Internet and
are frequently social networking applications. Therefore, the need to protect data and user …
are frequently social networking applications. Therefore, the need to protect data and user …