Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
    • by 
    • Cryptography and Network Security
As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to... more
    • by 
    •   20  
      Mathematics of CryptographyImage ProcessingGenetic AlgorithmsApplied Cryptography
    • by 
    • Cryptography and Network Security
Abstract - A mobile ad-hoc network (MANET) is collection of portable devices or PDA’s with conjunction with mobile communication, which is designed to communicate to one or more nodes. Unlike traditional mobile wireless networks, ad hoc... more
    • by 
    • Cryptography and Network Security
    • by 
    •   3  
      Cellular AutomataImage EncryptionCryptography and Network Security
File encryption is an easy means of securing personal or business data protection. The RSA and AES representative encryption algorithms are not capable of satisfying the criteria of file encryption reliability and security when used... more
    • by 
    • Cryptography and Network Security
The cryptography is the branch of Cryptology. It is a combination of mathematics and computer Science. It is the study of obscuring information in cyberspace. Cipher is a set of algorithm which comprise of encryption and decryption. The... more
    • by 
    •   20  
      Mathematics of CryptographyApplied CryptographyCryptographyQuantum Cryptography
    • by 
    •   11  
      MathematicsComputer ScienceEncryptionSecurity Policy
    • by 
    •   20  
      Mathematics of CryptographyComputer ScienceApplied CryptographyCryptography
Wireless network security is advancing consistently. This progress can be easily seeing by recounting the success stories achieved through the years since the modification of its first security protocol, WEP; then the WPA and finally the... more
    • by 
    • Cryptography and Network Security
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more
    • by 
    •   52  
      Wireless CommunicationsNetwork SecuritySensor Network SecurityNext Generation Internet Research
As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to... more
    • by 
    •   20  
      Mathematics of CryptographyImage ProcessingGenetic AlgorithmsApplied Cryptography
    • by 
    •   7  
      Speaker RecognitionAutomatic Speaker RecognitionMultimodal FusionSupport vector machine
    • by 
    •   10  
      Information TechnologyDigital SignatureAccess ControlMobile Communication
    • by 
    •   3  
      Computer ScienceSecurity PolicyCryptography and Network Security
In this paper, a C++ class for analising Vector Boolean Functions from a cryptographic perspective is presented. This implementation uses the NTL library from Victor Shoup, replacing some of the general purpose modules of this library by... more
    • by 
    •   14  
      CryptographyResiliencyCorrelationSpectrum
    • by 
    •   6  
      Mobile Ad Hoc NetworksComputer SecurityAd hoc networkCryptography and Network Security
As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to... more
    • by 
    •   20  
      Mathematics of CryptographyImage ProcessingGenetic AlgorithmsApplied Cryptography
In this paper, a C++ class for analising Vector Boolean Functions from a cryptographic perspective is presented. This implementation uses the NTL library from Victor Shoup, replacing some of the general purpose modules of this library by... more
    • by 
    •   14  
      CryptographyResiliencyCorrelationSpectrum
The current implementation of TLS involves your browser displaying a padlock, and a green bar, after successfully verifying the digital signature on the TLS certificate. Proposed is a solution where your browser's response to successful... more
    • by 
    •   49  
      Mathematics of CryptographyGame TheoryPKI (Cryptography)Game Theory (Psychology)
    • by 
    •   3  
      Quantum CryptographyCryptography and Network SecurityUnconditional Security
File encryption is an easy means of securing personal or business data protection. The RSA and AES representative encryption algorithms are not capable of satisfying the criteria of file encryption reliability and security when used... more
    • by 
    •   3  
      Computer ScienceEncryptionCryptography and Network Security
In this paper, we present a new tweakable narrow-block mode of operation, the Substitution Cipher Chaining mode (SCC), that can be efficiently deployed in disk encryption applications. SCC is characterized by its high throughout compared... more
    • by 
    • Cryptography and Network Security
RSA is the most widely used and tested public-key cryptosystem. In this paper, we have discussed the RSA algorithm, its complexity and security, the use of sieve function for the key generation process and its variant multi prime RSA... more
    • by 
    •   4  
      Operating SystemsDesign and Analysis of AlgorithmsData StructuresCryptography and Network Security
    • by 
    •   5  
      Systems AnalysisCryptographyModelsQualitative Analysis
14 th International Conference on Networks & Communications (NeCoM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Networks & Data Communications.... more
    • by 
    •   14  
      Wireless Sensor Network SecurityNetwork Security (Networks)Networks SecurityComputer and Network Security Information Assurance and Security Cyber Security Access Control in Collaborative, Mobile, Pervasive and Grid Systems Semantic Web and Security Ontologies
International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists,... more
    • by 
    •   20  
      Mathematics of CryptographyPKI (Cryptography)Applied CryptographyCryptography
    • by 
    •   11  
      Machine LearningData MiningSecurity and PrivacyAssociation Rule Mining
    • by 
    •   8  
      Access ControlInformation AssuranceReverse EngineeringFinancial Institutions
    • by 
    •   3  
      IsabelleFormal Verification of Cryptographic ProtocolsCryptography and Network Security
Cryptography has specific role to protect secret file from unauthorized access. Cryptography algorithms are classified in to two types, Symmetric-key producing and Public-key producing algorithms. In this paper, suggested a new... more
    • by 
    •   23  
      Mathematics of CryptographyComputer Security And ReliabilityInformation SecurityInternational Security
    • by 
    •   20  
      Mathematics of CryptographyComputer ScienceQuantum CryptographyChaotic cryptography
    • by 
    • Cryptography and Network Security
    • by 
    • Cryptography and Network Security
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific... more
    • by 
    •   110  
      Mobile Ad Hoc NetworksNetwork SecuritySecurity in Sensor NetworksVehicular Ad Hoc Networks
    • by 
    •   5  
      Formal Methods (Formal Verification)Theorem ProvingIsabelleFormal Verification of Cryptographic Protocols
As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to... more
    • by  and +1
    •   20  
      Mathematics of CryptographyImage ProcessingGenetic AlgorithmsApplied Cryptography
As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to... more
    • by 
    •   17  
      Mathematics of CryptographyPKI (Cryptography)Genetic AlgorithmsApplied Cryptography
    • by 
    • Cryptography and Network Security
    • by 
    •   10  
      Grid ComputingSecurity ManagementPolicy ManagementSecurity Policy
Abstract: The main aim of this paper is to strengthen secured communication by introducing a new cipher, Rbits Cipher (Random Bits Cipher). We can treat this cipher as new approach or an enhancement to One-Time Pad (OTP) encryption... more
    • by 
    • Cryptography and Network Security
"The Yahalom protocol is one of those analyzed by Burrows et al. [5]. Based upon their analysis, they have proposed modifications to make the protocol easier to understand and to analyze. Both versions of Yahalom have now been analyzed... more
    • by 
    •   4  
      Computational LogicIsabelleFormal Verification of Cryptographic ProtocolsCryptography and Network Security
Abstract: This paper exploits the existence of the redundant Arabic extension character, i.e. Kashida. We propose to use pointed letters in Arabic text with a Kashida to hold the secret bit ‘one ’ and the un-pointed letters with a Kashida... more
    • by 
    •   10  
      Information SecurityCryptographyElectricalSteganography
    • by 
    •   3  
      Self OrganizationCryptography and Network SecurityPublic Key
    • by 
    •   2  
      Cryptography and Network SecuritySecure Computation
ABSTRACT
    • by 
    •   2  
      Security ManagementCryptography and Network Security
    • by 
    •   2  
      SmartcardCryptography and Network Security
    • by 
    •   3  
      Standard ModelCryptography and Network SecurityGroup Signature
    • by 
    •   12  
      Information SecurityNetwork SecurityComputer NetworksSecurity