A novel network security algorithm based on private key encryption

A Abusukhon, M Talib - … on Cyber Security, Cyber Warfare and …, 2012 - ieeexplore.ieee.org
In cryptographic application, the data sent to a remote host are encrypted first at the source
machine using an encryption key then the encrypted data are sent to the destination …

[PDF][PDF] Secure network communication based on text-to-image encryption

A Abusukhon, M Talib, I Ottoum - International Journal of Cyber …, 2012 - academia.edu
Security becomes an important issue when secure or sensitive information is sent over a
network where all computers are connected together. In such a network a computer is …

[PDF][PDF] A novel network security algorithm based on encrypting text into a white-page image

ZM Ahmad Abusukhon, M Talib - Proceedings of the World Congress …, 2016 - academia.edu
Nowadays, data security becomes a big issue and a challenge when sending sensitive data
through the Internet. For example; sending user password, performing money transaction (e …

ElGamal algorithm for encryption of data transmission

Z Wu, D Su, G Ding - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
With continuous development of network technology, more and more attacks on system from
Internet have become more automated and caused greater damage and loss. It is important …

[PDF][PDF] Analyzing the efficiency of Text-to-Image encryption algorithm

A Abusukhon, M Talib, MA Nabulsi - International Journal of …, 2012 - academia.edu
Today many of the activities are performed online through the Internet. One of the methods
used to protect the data while sending it through the Internet is cryptography. In a previous …

Public network security by bluffing the intruders through encryption over encryption using public key cryptography method

V Madaan, D Sethi, P Agrawal, L Jain… - Advanced Informatics for …, 2017 - Springer
Cryptography and network security is the concept of protecting the network and data
transmission. Security of data is important, as data is transferred over unreliable network …

Data security in local area network based on fast encryption algorithm

G Ramesh, R Umarani - Recent Trends in Network Security and …, 2010 - Springer
Hacking is one of the greatest problems in the wireless local area networks. Many
algorithms have been used to prevent the outside attacks to eavesdrop or prevent the data …

Protecting computer network with encryption technique: A Study

KI Lakhtaria - … International Conference, UCMA 2011, Daejeon, Korea …, 2011 - Springer
In today's world the networking plays a very important role in our life. Most of the activities
occur through the Internet. For the safe and secured exchange of information, we need to …

[PDF][PDF] Data encryption and decryption using RSA algorithm in a network environment

NY Goshwe - International Journal of Computer Science and …, 2013 - academia.edu
One of the principal challenges of resource sharing on data communication network is its
security. This is premised on the fact that once there is connectivity between computers …

Study of file encryption and decryption system using security key

G Hu - 2010 2nd International Conference on Computer …, 2010 - ieeexplore.ieee.org
The paper tries to have made a study of the security keys of USB, which can achieve these
functions such as data encryption, digital signature, and identity authentication. Based on …