Published Articles with Keyword: encryption
- Title: Cloud Access Security Brokers: An easy-implement Method for Accessing Cloud Services Securely
Authors: Israa Basim, Ahmed Fakhfakh, Amel Meddeb Makhlouf
Doi: 10.37394/23209.2025.22.17
Download
| Download 
Published in WSEAS Transactions on Information Science and Applications, Volume 22, 2025
- Title: End-To-End Cybersecurity Encryption- Video Algorithm
Authors: Obaida M. Al-Hazaimeh, Ma'moun A. Al-Smadi, Tarik Abuain, Ashraf A. Abu-Ein
Doi: 10.37394/232018.2025.13.12
Download
| Download 
Published in WSEAS Transactions on Computer Research, Volume 13, 2025
- Title: An Efficient Multilayer approach for Securing E-Healthcare Data in Cloud using Crypto – Stego Technique
Authors: Nagamany Abirami, M. S. Anbarasi
Doi: 10.37394/232025.2024.6.13
Download
| Download 
Published in Engineering World, Volume 6, 2024
- Title: Enhanced Device-Specific Encryption for IoT: Leveraging
Microcontroller UIDs and Dedicated Cryptographic Hardware
Authors: Edwar Jacinto, Fredy Martinez, Fernando Martinez
Doi: 10.37394/23203.2024.19.19
Download
| Download 
Published in WSEAS Transactions on Systems and Control, Volume 19, 2024
- Title: Optimum Vector Information Technologies Based on the Multidimensional Combinatorial Configurations
Authors: Volodymyr Riznyk
Doi: 10.37394/232028.2023.3.12
Download
| Download 
Published in International Journal of Computational and Applied Mathematics & Computer Science, Volume 3, 2023
- Title: RSA and AES Based Hybrid Encryption Technique for Enhancing Data Security in Cloud Computing
Authors: Rima Akter, Md. Ashikur Rahman Khan, Fardowsi Rahman, Sultana Jahan Soheli, Nusrat Jahan Suha
Doi: 10.37394/232028.2023.3.8
Download
| Download 
Published in International Journal of Computational and Applied Mathematics & Computer Science, Volume 3, 2023
- Title: Encryption of Dynamic Areas of Images in Video based on Certain Geometric and Color Shapes
Authors: Nashat Al Bdour
Doi: 10.37394/23209.2023.20.13
Download
| Download 
Published in WSEAS Transactions on Information Science and Applications, Volume 20, 2023
- Title: Improving the IoT and Cloud Computing integration using Hybrid Encryption
Authors: Nadeem Chahin, Abeer Mansour
Doi: 10.37394/232022.2023.3.1
Download
| Download 
Published in Design, Construction, Maintenance, Volume 3, 2023
- Title: Improvement of the Secure Integration of IoT and Cloud Computing using Hybrid Encryption
Authors: P. Dr. Nadeem Chahin, Eng. Abeer Mansour
Doi: 10.37394/232027.2022.4.10
Download
| Download 
Published in International Journal of Electrical Engineering and Computer Science, Volume 4, 2022
- Title: FPGA Implementation of Enhanced Throughput Design of AES Architecture using Nikhilam Sutra
Authors: Bindu Swetha Pasuluri, V. J. K. Kishor Sonti
Doi: 10.37394/232027.2022.4.8
Download
| Download 
Published in International Journal of Electrical Engineering and Computer Science, Volume 4, 2022
- Title: Selection of Intelligent Rules for the Evolution of Elementary Cellular Automata for Image Encryption
Authors: Nashat Al Bdour
Doi: 10.37394/23203.2022.17.48
Download
| Download 
Published in WSEAS Transactions on Systems and Control, Volume 17, 2022
- Title: A Multi-hop and Distributed Proxy Re-encryption Scheme with Dynamic Re-sharing
Authors: Juntao Cao, Xin Pei, Xiaochuan Wu
Doi: 10.37394/23209.2022.19.18
Download
| Download 
Published in WSEAS Transactions on Information Science and Applications, Volume 19, 2022
- Title: Construction and Analysis of Models of Increasing Reliability for Modular Encryption Algorithm
Authors: R. Biyashev, N. Kapalova, S. Nyssanbayeva, A. Haumen
Doi: 10.37394/23204.2022.21.7
Download
| Download 
Published in WSEAS Transactions on Communications, Volume 21, 2022
- Title: Encryption Algorithms on BMP and JPEG Images
Authors: Sara Chillali, Lahcen Oughdir
Doi: 10.37394/232014.2022.18.3
Download
| Download 
Published in WSEAS Transactions on Signal Processing, Volume 18, 2022
- Title: Using AES Encryption Algorithm to Optimize High-tech Intelligent Platform
Authors: Chung-Chih Lee, Hsing-Chau Tseng, Chun-Chu Liu, Huei-Jeng Chou
Doi: 10.37394/23207.2021.18.143
Download
| Download 
Published in WSEAS Transactions on Business and Economics, Volume 18, 2021
- Title: A Heuristic Method to Approximate the Closest Vector Problem
Authors: Mustapha Elhassani, Abdelhakim Chillali, Ali Mouhib
Doi: 10.37394/23206.2021.20.79
Download
| Download 
Published in WSEAS Transactions on Mathematics, Volume 20, 2021
- Title: An Efficient Information Hiding Mechanism based on Confusion Component over Local Ring and Moore-Penrose Pseudo Inverse
Authors: Nabilah Abughazalah, Majid Khan
Doi: 10.37394/23206.2021.20.3
Download
| Download 
Published in WSEAS Transactions on Mathematics, Volume 20, 2021
- Title: Security Risk of Wireless Implantable Medical Devices
Authors: Steven Suggett, Lucien Ngalamou
Doi: 10.37394/23209.2020.17.10
Download
| Download 
Published in WSEAS Transactions on Information Science and Applications, Volume 17, 2020
- Title: IOT Supported Security Considerations for Network
Authors: K. Thamizhmaran
Doi: 10.37394/23204.2020.19.14
Download
| Download 
Published in WSEAS Transactions on Communications, Volume 19, 2020
- Title: Secure Image Steganography Using Tri - Way Pixel - Value Differencing on Two Cover Images
Authors: Archana O. Vyas, Sanjay V. Dudul
Download
| Download 
Published in WSEAS Transactions on Computers, Volume 17, 2018
- Title: Applications of Chaotic Maps and Coding for Secure Transmission of Images over Wireless Channels
Authors: Mona F. M. Mursi, Ayman H. Abd El-Aziem
Download
| Download 
Published in WSEAS Transactions on Computer Research, Volume 4, 2016
- Title: Reliability and Performance Assessment of Multifarious Hybrid Cryptosystems
Authors: Ijaz Ali Shoukat, Abdullah Al-Dhelaan, Mznah Al-Rodhaan, Kamalrulnizam Abu Bakar, Subariah Ibrahim
Download
| Download 
Published in WSEAS Transactions on Information Science and Applications, Volume 13, 2016
- Title: Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Download
| Download 
Published in WSEAS Transactions on Computers, Volume 15, 2016
- Title: An Investigation of the Use of MJEA in Image Encryption
Authors: Jamal N. Bani Salameh
Download
| Download 
Published in WSEAS Transactions on Computers, Volume 15, 2016
- Title: Image Cryptosystem Based on Digital Signature and Double Random Phase Encoding
Authors: Hayam Abdel-Mordy, Emad S. Hassan, Sami A. El-Dolil, Fathi E. Abd El-Samie
Download
| Download 
Published in WSEAS Transactions on Signal Processing, Volume 11, 2015
- Title: CIADS: A Framework for Secured Storage of Patients Medical Data in Cloud
Authors: Suresh Jaganathan, Dhivya Veerappan
Download
| Download 
Published in WSEAS Transactions on Information Science and Applications, Volume 12, 2015
- Title: Multi-Integer Somewhat Homomorphic Encryption Scheme with China Remainder Theorem
Authors: Chao Feng, Yang Xin, Yixian Yang, Hongliang Zhu
Download
| Download 
Published in WSEAS Transactions on Computers, Volume 14, 2015
- Title: Secure Key Sharing in Mobile Ad Hoc Network Using Content Invisibility Scheme
Authors: A. Jegatheesan, D. Manimegalai
Download
| Download 
Published in WSEAS Transactions on Computers, Volume 14, 2015
- Title: Authentication Protocol for Fingerprint Feature Extraction and IBC in Monitoring Systems
Authors: Changgeng Yu, Liping Lai
Download
| Download 
Published in WSEAS Transactions on Communications, Volume 14, 2015
- Title: Migration of the Perfect Cipher to the Current Computing Environment
Authors: Petr Voborník
Download
| Download 
Published in WSEAS Transactions on Information Science and Applications, Volume 11, 2014
- Title: Implementation of Efficient Bit Permutation Box for Embedded Security
Authors: Nishchal Raval, Gaurav Bansod, Narayan Pisharoty
Download
| Download 
Published in WSEAS Transactions on Computers, Volume 13, 2014
- Title: Application of Improved SSL in Data Security Transmission of Mobile Database System
Authors: Ruifeng Wang, Xiaohua Zhang, Dechao Xu
Download
| Download 
Published in WSEAS Transactions on Communications, Volume 13, 2014
- Title: Chaotic Image Encryption via Convex Sinusoidal Map
Authors: F. Abu-Amara, I. Abdel-Qader
Download
| Download 
Published in WSEAS Transactions on Signal Processing, Volume 9, 2013
- Title: A Novel Image Encryption Approach Using Matrix Reordering
Authors: T. Sivakumar, R. Venkatesan
Download
| Download 
Published in WSEAS Transactions on Computers, Volume 12, 2013
- Title: Low Color-Depth Image Encryption Scheme for use in COTS Smartphones
Authors: Nikolaos Doukas
Download
| Download 
Published in WSEAS Transactions on Systems, Volume 11, 2012
- Title: FPGA Implementation of Elliptic Curve Cryptography Engine for Personal Communication Systems
Authors: M. B. I. Reaz, J. Jalil, H. Husian, F. H. Hashim
Download
| Download 
Published in WSEAS Transactions on Circuits and Systems, Volume 11, 2012