Cryptography and Network Security
518 Followers
Recent papers in Cryptography and Network Security
As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to... more
Abstract - A mobile ad-hoc network (MANET) is collection of portable devices or PDA’s with conjunction with mobile communication, which is designed to communicate to one or more nodes. Unlike traditional mobile wireless networks, ad hoc... more
File encryption is an easy means of securing personal or business data protection. The RSA and AES representative encryption algorithms are not capable of satisfying the criteria of file encryption reliability and security when used... more
The cryptography is the branch of Cryptology. It is a combination of mathematics and computer Science. It is the study of obscuring information in cyberspace. Cipher is a set of algorithm which comprise of encryption and decryption. The... more
Wireless network security is advancing consistently. This progress can be easily seeing by recounting the success stories achieved through the years since the modification of its first security protocol, WEP; then the WPA and finally the... more
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more
As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to... more
In this paper, a C++ class for analising Vector Boolean Functions from a cryptographic perspective is presented. This implementation uses the NTL library from Victor Shoup, replacing some of the general purpose modules of this library by... more
As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to... more
In this paper, a C++ class for analising Vector Boolean Functions from a cryptographic perspective is presented. This implementation uses the NTL library from Victor Shoup, replacing some of the general purpose modules of this library by... more
The current implementation of TLS involves your browser displaying a padlock, and a green bar, after successfully verifying the digital signature on the TLS certificate. Proposed is a solution where your browser's response to successful... more
File encryption is an easy means of securing personal or business data protection. The RSA and AES representative encryption algorithms are not capable of satisfying the criteria of file encryption reliability and security when used... more
In this paper, we present a new tweakable narrow-block mode of operation, the Substitution Cipher Chaining mode (SCC), that can be efficiently deployed in disk encryption applications. SCC is characterized by its high throughout compared... more
RSA is the most widely used and tested public-key cryptosystem. In this paper, we have discussed the RSA algorithm, its complexity and security, the use of sieve function for the key generation process and its variant multi prime RSA... more
14 th International Conference on Networks & Communications (NeCoM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Networks & Data Communications.... more
- by International Journal of Ad hoc, Sensor & Ubiquitous Computing Journal
- Wireless Sensor Network Security, Network Security (Networks), Networks Security, Computer and Network Security Information Assurance and Security Cyber Security Access Control in Collaborative, Mobile, Pervasive and Grid Systems Semantic Web and Security Ontologies
International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists,... more
Cryptography has specific role to protect secret file from unauthorized access. Cryptography algorithms are classified in to two types, Symmetric-key producing and Public-key producing algorithms. In this paper, suggested a new... more
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific... more
As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to... more
Abstract: The main aim of this paper is to strengthen secured communication by introducing a new cipher, Rbits Cipher (Random Bits Cipher). We can treat this cipher as new approach or an enhancement to One-Time Pad (OTP) encryption... more
"The Yahalom protocol is one of those analyzed by Burrows et al. [5]. Based upon their analysis, they have proposed modifications to make the protocol easier to understand and to analyze. Both versions of Yahalom have now been analyzed... more
Abstract: This paper exploits the existence of the redundant Arabic extension character, i.e. Kashida. We propose to use pointed letters in Arabic text with a Kashida to hold the secret bit ‘one ’ and the un-pointed letters with a Kashida... more