A Abusukhon, S AlZu'bi - 2020 Seventh International …, 2020 - ieeexplore.ieee.org
Data encryption techniques are important for answering the question: How secure is the Internet for sending sensitive data. Keeping data secure while they are sent through the …
AAA Alkhatib, A Alsabbagh, R Maraqa… - Advances in science …, 2021 - researchgate.net
It has become difficult to handle traditional networks because of extensive network developments and an increase in the number of network users, and also because of new …
J Zheng, LF Liu - IET image processing, 2020 - Wiley Online Library
The one‐dimensional (2D) chaotic encryption algorithm has good encryption performance. For its properties, such as the excellent complexity, pseudo‐randomness, and sensitivity to …
The MQV is an authenticated key agreement protocol which does not use any one-way hash functions in its block design, and it is standardized in (IEEE, ANSI, and ISO). However, its …
Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user protection. To …
AK Das, N Kar - International Conference on Advances in Cyber …, 2021 - Springer
Cryptography is the art of presenting secret information under code obfuscation. This can be achieved by various algorithms which convert human readable text into non-legible text …
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a widely used technique on which key exchange systems around the world depend. This …
C Tiken, R Samlı - Harran Üniversitesi Mühendislik Dergisi, 2022 - dergipark.org.tr
In today's technology world, data security has a great importance. Because each data type has its own characteristics, there are various methods of providing this security. The main …
A Abusukhon - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
In the recent era of digital revolution, life has become simple and more comfortable than it was before. Today, we are witnessing a revolution in the information technology domain …