Real-time encryption/decryption algorithm with a fractional chaotic system of various data: Image, speech, and text

MT Ataş, H Güler - International Journal of Applied and Computational …, 2022 - Springer
Nowadays, a fractional-order chaotic system is commonly used in digital cryptosystem
applications due to its precision to initial conditions and their unpredictability. This paper …

Developing an efficient solution to information hiding through text steganography along with cryptography

MP Uddin, M Saha, SJ Ferdousi… - … forum on strategic …, 2014 - ieeexplore.ieee.org
Now-a-days information security over unsecured communication channel is one of the most
challenging issues. Cryptography and steganography, a sub-discipline of information hiding …

[PDF][PDF] Lightweight Dynamic Crypto Algorithm for Next Internet Generation.

AH Al-Omari - Engineering, Technology & Applied Science …, 2019 - academia.edu
Modern applications, especially real time applications, are hungry for high-speed end-to-
end transmission which usually conflicts with the necessary requirements of confidential and …

[PDF][PDF] Monitoring Based Security Approach for Cloud Computing.

AK Yadav, MLG Ritika, ML Garg - Ingénierie des Systèmes d Inf., 2019 - academia.edu
Accepted: 15 September 2019 Cloud Service owner manages and maintains a variety of
services for the end-users and enterprises. To provide security to user data, many security …

Double Chaining Algorithm: A secure symmetric-key encryption algorithm

DH Kurniawan, R Munir - 2016 International Conference On …, 2016 - ieeexplore.ieee.org
Technology is a key of innovation in any aspect of this modern era. In every technology, data
becomes the most important asset to be protected. Many encryption algorithms are widely …

Developing a cryptographic algorithm based on ASCII conversions and a cyclic mathematical function

MP Uddin, MA Marjan, NB Sadia… - … , Electronics & Vision …, 2014 - ieeexplore.ieee.org
Encryption and decryption of data in an efficient manner is one of the challenging aspects of
modern computer science. This paper introduces a new algorithm for Cryptography to …

A cryptographic algorithm based on ASCII and number system conversions along with a cyclic mathematical function

MH Moon, MP Uddin, MI Afjal… - 2019 International …, 2019 - ieeexplore.ieee.org
Data encryption and decryption in an efficient manner are the challenging aspects of
modern information theory. An efficient cryptology algorithm is introduced in this paper to …

[PDF][PDF] DEA-RTA: A dynamic encryption algorithm for the real-time applications

AH Omari, BM Al-Kasasbeh, RE Al-Qutaish… - International journal of …, 2009 - Citeseer
The Internet and it is applications are hungry for high level of Quality of Service (QoS), and
most of the Internet applications seek to minimize packets delay, especially, the Real-Time …

[PDF][PDF] Mapping character position based cryptographic algorithm with numerical conversions

MH Moon, AKMTI Tanim, MZ Shoykot… - … Journal of Computer …, 2020 - researchgate.net
Security of data is the challenging aspects of modern information technology. An improved
cryptology algorithm is introduced in this paper to offer comparatively higher security. We …

[PDF][PDF] A Real-Time Encryption Algorithm For User Data Preservation In Mobile Computing

C Okah, D Matthias, N Nwiabu - SSRG International Journal of …, 2020 - researchgate.net
More recently, many businesses are sending real-time Application (RTA) on the Internet and
are frequently social networking applications. Therefore, the need to protect data and user …