AA Hussein - Journal of Information Security, 2021 - scirp.org
Data Migration is a multi-step process that begins with analyzing old data and culminates in data uploading and reconciliation in new applications. With the rapid growth of data …
In the internet age, the security of data exchange becomes risky from some tapping attacks. One of the ways to maintain the data's security is by using steganography techniques. In this …
JR Ngnie Sighom, P Zhang, L You - Future Internet, 2017 - mdpi.com
In today's society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic …
OI Omotosho - International Journal of Computer Science and Mobile …, 2019 - academia.edu
Cloud computing is commonly used to represent any work done on a computer, mobile or any device, where the data and possibly the application being used do not reside on the …
SV GADED, A Deshpande - 2019 3rd International conference …, 2019 - ieeexplore.ieee.org
Generally AES algorithm uses Substitution box which works with ROM based lookup tables. Using the rom based Look up table, there occurs a significant irreducible amount of delay in …
Z Kasiran, HF Ali, NM Noor - Indonesian Journal of Electrical …, 2019 - academia.edu
The advancement of the data communication technologies has increased the traffic of data exchange over the internet and at the same time created the opportunity of data attack by …
EV Maliberan, AM Sison… - International Journal of …, 2018 - search.proquest.com
The enhanced MD5 algorithm has been developed by expanding its hash value up to 1280 bits from the original size of 128 bit using XOR and AND operators. Findings revealed that …
EV Maliberan - International Journal of Communication …, 2019 - search.proquest.com
The modified SHA1 algorithm has been developed by expanding its hash value up to 1280 bits from the original size of 160 bit. This was done by allocating 32 buffer registers for …
This research proposes an encryption method in text that adopts the chaotic method which is popularly used in 2D matrices such as images. Chaos methods such as Arnold's Cat Map …