[PDF][PDF] Analysis of network data Encryption & Decryption techniques in communication systems

CJ Ezeofor, AG Ulasi - … Journal of Innovative Research in Science …, 2014 - researchgate.net
… of network data encryption and decryption techniques used in communication systems. In …
this research work, different data encryption techniques used in encrypting and decrypting

A fast text-to-image encryption-decryption algorithm for secure network communication

NS Noor, DA Hammood, A Al-Naji, J Chahl - Computers, 2022 - mdpi.com
… authentication, data encryption, data decryption, data recovery, … encrypted file was decreased
compared to WinRAR. In this study, Arabic and English texts were encrypted and decrypted

[PDF][PDF] Data encryption and decryption using RSA algorithm in a network environment

NY Goshwe - … Journal of Computer Science and Network Security …, 2013 - academia.edu
communication has … network of users that can communicate securely with one another
even if they had never communicated before [6-8]. This paper considers a Public Key encryption

[PDF][PDF] A new hybrid data encryption and decryption technique to enhance data security in communication networks: algorithm development

B Adedeji Kazeem, P Akinlolu - Int. J. Sci. Eng. Res, 2014 - researchgate.net
Encryption works by running the data through a special encryption formula called a key [4].
Decryption is the reverse process of converting encrypted data to its original un-encoded form…

Encryption and secure computer networks

GJ Popek, CS Kline - ACM Computing Surveys (CSUR), 1979 - dl.acm.org
… For several participants in a network conversation to communicate securely, it is necessary
for them to obtain matching keys to encrypt and decrypt the transmitted data. It should be …

[PDF][PDF] Real-time encryption/decryption of audio signal

MI Khalil - … Journal of Computer Network and Information Security, 2016 - mecs-press.net
communication [15-17]. The current paper proposes a new symmetric-based encryption/decryption
-end secrecy for speech in real time communication systems. The performance of the …

Research on neural network chaotic encryption algorithm in wireless network security communication

C Liang, Q Zhang, J Ma, K Li - … Wireless Communications and Networking, 2019 - Springer
… The experimental results show that the algorithm proposed in this paper has a significant
improvement in the encryption and decryption speed and anti-deciphering ability of the key. …

[PDF][PDF] ENCRYPTION/DECRYPTION USING ELLIPTICAL CURVE CRYPTOGRAPHY.

AJ Zargar, M Manzoor, T Mukhtar - International journal of Advanced …, 2017 - academia.edu
… else on the network does. It is done by using methods of encryption and decryption, wherein
… the public key of Y, it is now capable of communicating securely over the network by simply …

[PDF][PDF] A secure and fast approach for encryption and decryption of message communication

E Agrawal, PR Pal - Int. J. Eng. Sci, 2017 - researchgate.net
… the encryption is to secure or protect data from unauthorized access in term of viewing or
modifying the data. Encryption can … key based algorithm to encrypt and decrypt the text data has …

[PDF][PDF] Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication

S Koko, A Babiker - IOSR Journal of Computer Engineering (IOSR …, 2015 - academia.edu
… is used to encrypt and decrypt a message so that it arrives securely. Initially, a network user
requests a public and private key pair. A user who wants to send an encrypted message can …