Information security, being one of the corner stones of network and communication technology, has been evolving tremendously to cope with the parallel evolution of network …
A Abusukhon, M Talib - … on Cyber Security, Cyber Warfare and …, 2012 - ieeexplore.ieee.org
In cryptographic application, the data sent to a remote host are encrypted first at the source machine using an encryption key then the encrypted data are sent to the destination …
Encryption techniques are important on the Internet. The challenges of color-coding are still hot topics. Many papers were published to develop encryption algorithms to prevent security …
M Kaushik, G Ojha - International journal of advanced …, 2014 - search.proquest.com
The SQL Injection attack is a popular way of attack, in terms of document structure and common threats now a day. There are several ways of attack detection, as per this study and …
A Abusukhon, M Talib, I Ottoum - International Journal of Cyber …, 2012 - academia.edu
Security becomes an important issue when secure or sensitive information is sent over a network where all computers are connected together. In such a network a computer is …
A Ahmad, T Mohammad, HM Almimi - International Journal of Computer …, 2014 - Citeseer
Data encryption techniques are used to protect data against hackers. Text-to-Image encryption algorithm (TTIE) is an encryption algorithm proposed for data encryption. The …
B Li, Q Zhou, X Si, J Fu - IEEE Access, 2018 - ieeexplore.ieee.org
With the rapid development of the Internet, increasingly more attention has been paid to network security problems. A network security defense technology has become a very …
A Abusukhon, M Talib, MA Nabulsi - International Journal of …, 2012 - academia.edu
Today many of the activities are performed online through the Internet. One of the methods used to protect the data while sending it through the Internet is cryptography. In a previous …
P Guwalani, M Kala, R Chandrashekar… - Pooja Guwalani Int …, 2014 - Citeseer
Abstract Information security is becoming a vital component of any data storage and transmission operations. Since visual representation of data is gaining importance, data in …