[HTML][HTML] Medical image encryption: an application for improved padding based GGH encryption algorithm

M Sokouti, A Zakerolhosseini… - The open medical …, 2016 - ncbi.nlm.nih.gov
Medical images are regarded as important and sensitive data in the medical informatics
systems. For transferring medical images over an insecure network, developing a secure …

[PDF][PDF] Bit-based cube rotation for text encryption

R Rihartanto, DSB Utomo, H Februariyanti… - Int. J. Electr. Comput …, 2023 - academia.edu
Today's rapid technological developments make information increasingly important. Not just
its content, but the channels or media used for information distribution also need to be …

[PDF][PDF] A new approach for securing medical images and Patient's information by using a hybrid system

JNB Salameh - Int J of Computer Sci Netw Secur, 2019 - researchgate.net
Today a huge number of medical images and patient's information are transferred between
different entities who are geographically apart to be reviewed and evaluated. Any illegal …

[PDF][PDF] Novel technique for securing data communication systems by using cryptography and steganography

WH Al-Qwider, JNB Salameh - Jordanian Journal of Computers …, 2017 - researchgate.net
Information security is becoming more important and attracting much attention nowadays, as
the amount of data being exchanged over the internet increased. There are various …

The benefit of using chaos in key schedule algorithm

Y Harmouch, R El Kouch - Journal of information security and applications, 2019 - Elsevier
Many ciphers suffer from weak-key issues. This problem is due to the simplicity of the key
schedule algorithm. Unfortunately, the cipher designers have not paid much attention to the …

Symmetric cryptography using multiple access circular queues (MACQ)

S Phull, S Som - Proceedings of the Second International Conference …, 2016 - dl.acm.org
In order to provide secure data communication in present cyber space world, a stronger
encryption technique becomes a necessity that can help people to protect their sensitive …

Implementasi XOR Guna Peningkatan Enkripsi Teks Menggunakan Rotasi Multi Kubus.

B Utomo, D Susilo - Techno. com, 2024 - search.ebscohost.com
Meluasnya penggunaan internet semakin memudahkan seseorang untuk mendapatkan
informasi. Kemudahan akses ini membuka peluang perilaku illegal dalam memperoleh dan …

Bit-based cube rotation for text encryption.

B Utomo, D Susilo, H Februariyanti… - … Journal of Electrical …, 2023 - search.ebscohost.com
Today's rapid technological developments make information increasingly important. Not just
its content, but the channels or media used for information distribution also need to be …

[PDF][PDF] An investigation of the use of MJEA in image encryption

JNB Salameh, PO Mu'tah–Karak - WSEAS Transactions on Computers, 2016 - wseas.us
In today's digital world, electronic communication means are susceptible to attacks and
eavesdropping, where security problems such as modification and forgery have reached …

ENKRIPSI TEKS DENGAN PENDEKATAN BITSTREAM

H Februariyanti, A Susanto, A Azhari, R Rihartanto - Dinamik, 2022 - unisbank.ac.id
Informasi merupakan aset penting baik itu bagi pemerintah, organisasi swasta, universitas,
LSM, atau perorangan. Perkembangan teknologi yang pesat menjadikan informasi semakin …