On blockchain and IoT integration platforms: current implementation challenges and future perspectives

C Nartey, ET Tchao, JD Gadze… - Wireless …, 2021 - Wiley Online Library
Digitization and automation have engulfed every scope and sphere of life. Internet of Things
(IoT) has been the main enabler of the revolution. There still exist challenges in IoT that …

Chaotic based multimedia encryption: a survey for network and internet security

OM Al-Hazaimeh, AA Abu-Ein, MM Al-Nawashi… - Bulletin of Electrical …, 2022 - beei.org
Nowadays the security of multimedia data storage and transfer is becoming a major
concern. The traditional encryption methods such as DES, AES, 3-DES, and RSA cannot be …

[PDF][PDF] Chaotic elliptic map for speech encryption

OM Al-Hazaimeh, AA Abu-Ein, KM Nahar… - Indonesian Journal of …, 2022 - academia.edu
Using a new key management system and Jacobian elliptic map, a new speech encryption
scheme has been developed for secure speech communication data. Jacobian elliptic map …

[PDF][PDF] Digital speech files encryption based on Hénon and gingerbread chaotic maps

NF Hassan, A Al-Adhami, MS Mahdi - Iraqi Journal of Science, 2022 - iasj.net
Speech encryption approaches are used to prevent eavesdropping, tracking, and other
security concerns in speech communication. In this paper, a new cryptography algorithm is …

[PDF][PDF] Features of genetic algorithm for plain text encryption

RB Abduljabbar, OK Hamid, NJ Alhyani - International Journal of …, 2021 - core.ac.uk
The data communication has been growing in present day. Therefore, the data encryption
became very essential in secured data transmission and storage and protecting data …

On chaos in the fractional-order discrete-time macroeconomic systems

RB Albadarneh, A Abbes, A Ouannas… - AIP Conference …, 2023 - pubs.aip.org
This work proposes a new fractional-order form of a Discrete-time macroeconomic system
based on the Caputo–like difference operator. The dynamics of the proposed system are …

Research trends review on RSA scheme of asymmetric cryptography techniques

MSA Mohamad, R Din, JI Ahmad - Bulletin of Electrical Engineering and …, 2021 - beei.org
One of the cryptography classifications is asymmetric cryptography, which uses two different
keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of …

[PDF][PDF] Analytical Approach for Data Encryption Standard Algorithm.

OM Al-hazaimeh, Moy'awiah Al-Shannaq… - Int. J. Interact. Mob …, 2023 - researchgate.net
Although it was first developed and studied in the late 1970s and early 1977s, the Data
Encryption Standard (DES) algorithm has grown in popularity. There are two causes for this …

A New Public Key Encryption Using Dickson Polynomials Over Finite Field with 

K Paul, MM Singh, P Goswami - Nonlinear Dynamics and Applications …, 2022 - Springer
The Dickson polynomials are widely used in different context. Because of the permutation
behaviors and semi-group property under composition, its application can also be noticed in …

Vehicle To Vehicle and Vehicle To Ground Communication-Speech Encryption Algorithm

OM Al-Hazaimeh, A Ma'moun - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Vehicle to vehicle (V2V) communication has many applications in intelligent transportation
system (ITS) like smart grid systems, fleet management and traffic light control. It aims to …