An intelligent tutoring system for teaching advanced topics in information security

AO Mahdi, MI Alhabbash, SSA Naser - 2016 - philpapers.org
Recently there is an increasing technological development in intelligent tutoring systems.
This field has become interesting to many researchers. In this paper, we present an …

Learning computer networks using intelligent tutoring system

MM Al-Hanjori, MZ Shaath, SSA Naser - 2017 - philpapers.org
Abstract Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate,
education, health, training, and educational programs. In this paper we describe an …

ITS for teaching DES information security Algorithm

AEA Alnajar, M Hanjory - 2017 - philpapers.org
Lately there is more attention paid to technological development in intelligent tutoring
systems. This field is becoming an interesting topic to many researchers. In this paper, we …

Generation of high-order random key matrix for Hill Cipher encryption using the modular multiplicative inverse of triangular matrices

Y Chen, R Xie, H Zhang, D Li, W Lin - Wireless Networks, 2023 - Springer
Hill Cipher is one of the classic symmetric encryption algorithms widely used in cloud data
security. Although the hill cipher principle is relatively simple, its key matrix must be …

Hybrid approach of image encryption using DNA cryptography and TF Hill Cipher Algorithm

RK Jangid, N Mohmmad, A Didel… - … on Communication and …, 2014 - ieeexplore.ieee.org
The Hill cipher algorithm is one of the symmetric key algorithms that have many variations
but still not suited for all zeroes plaintext block. Chosen-plaintext attack can be possible on …

Encryption based on multilevel security for relational database EBMSR

AY Mahmoud, MNA Alqumboz - 2019 International Conference …, 2019 - ieeexplore.ieee.org
Cryptography is one of the most important sciences today because of the importance of data
and the possibility of sharing data via the Internet. Therefore, data must be preserved when …

Modification of Select Operation Model for Multilevel Security: Medical Database Systems as an Application

AY Mahmoud, MM Abu-Saqer - 2020 International Conference …, 2020 - ieeexplore.ieee.org
Information security (IS) is essential and important in different application fields. Medical
databases (MD) and healthcare applications (HA) are not an exception; information security …

[PDF][PDF] Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution

B Vishnuvardhan - International Journal of Security (IJS), 2014 - academia.edu
Many classical cryptosystems are developed based on simple substitution. Hybrid
cryptosystem using byte substitution and variable length sub key groups is a simple …

[PDF][PDF] Derivations on ranked bigroupoids

NO Alshehri, HS Kim, J Neggers - Applied Mathematics & …, 2013 - researchgate.net
Derivations on ranked bigroupoids Page 1 Appl. Math. Inf. Sci. 7, No. 1, 161-166 (2013) 161
Applied Mathematics & Information Sciences An International Journal c © 2013 NSP Natural …

The probabilistic encryption algorithm using linear transformation

KAN Reddy, B Vishnuvardhan - Emerging ICT for Bridging the Future …, 2015 - Springer
The probabilistic encryption produces more than one ciphertext for the same plaintext. In this
paper an attempt has been made to propose a probabilistic encryption algorithm based on …