What the Editors-in-Chief say about the review process in our Journals: Our Editors-in-Chief declare, confirm, certify and sign the substantial, important, line by line peer review process and our high-rejection rates.
Published Articles with Keyword: encryption
- Title: An Efficient Multilayer approach for Securing E-Healthcare Data in Cloud using Crypto – Stego Technique
Authors: Nagamany Abirami, M. S. Anbarasi
Doi: 10.37394/232025.2024.6.13
Download | Download
Published in Engineering World, Volume 6, 2024 - Title: Enhanced Device-Specific Encryption for IoT: Leveraging
Microcontroller UIDs and Dedicated Cryptographic Hardware
Authors: Edwar Jacinto, Fredy Martinez, Fernando Martinez
Doi: 10.37394/23203.2024.19.19
Download | Download
Published in WSEAS Transactions on Systems and Control, Volume 19, 2024 - Title: Optimum Vector Information Technologies Based on the Multidimensional Combinatorial Configurations
Authors: Volodymyr Riznyk
Doi: 10.37394/232028.2023.3.12
Download | Download
Published in International Journal of Computational and Applied Mathematics & Computer Science, Volume 3, 2023 - Title: RSA and AES Based Hybrid Encryption Technique for Enhancing Data Security in Cloud Computing
Authors: Rima Akter, Md. Ashikur Rahman Khan, Fardowsi Rahman, Sultana Jahan Soheli, Nusrat Jahan Suha
Doi: 10.37394/232028.2023.3.8
Download | Download
Published in International Journal of Computational and Applied Mathematics & Computer Science, Volume 3, 2023 - Title: Encryption of Dynamic Areas of Images in Video based on Certain Geometric and Color Shapes
Authors: Nashat Al Bdour
Doi: 10.37394/23209.2023.20.13
Download | Download
Published in WSEAS Transactions on Information Science and Applications, Volume 20, 2023 - Title: Improving the IoT and Cloud Computing integration using Hybrid Encryption
Authors: Nadeem Chahin, Abeer Mansour
Doi: 10.37394/232022.2023.3.1
Download | Download
Published in Design, Construction, Maintenance, Volume 3, 2023 - Title: Improvement of the Secure Integration of IoT and Cloud Computing using Hybrid Encryption
Authors: P. Dr. Nadeem Chahin, Eng. Abeer Mansour
Doi: 10.37394/232027.2022.4.10
Download | Download
Published in International Journal of Electrical Engineering and Computer Science, Volume 4, 2022 - Title: FPGA Implementation of Enhanced Throughput Design of AES Architecture using Nikhilam Sutra
Authors: Bindu Swetha Pasuluri, V. J. K. Kishor Sonti
Doi: 10.37394/232027.2022.4.8
Download | Download
Published in International Journal of Electrical Engineering and Computer Science, Volume 4, 2022 - Title: Selection of Intelligent Rules for the Evolution of Elementary Cellular Automata for Image Encryption
Authors: Nashat Al Bdour
Doi: 10.37394/23203.2022.17.48
Download | Download
Published in WSEAS Transactions on Systems and Control, Volume 17, 2022 - Title: A Multi-hop and Distributed Proxy Re-encryption Scheme with Dynamic Re-sharing
Authors: Juntao Cao, Xin Pei, Xiaochuan Wu
Doi: 10.37394/23209.2022.19.18
Download | Download
Published in WSEAS Transactions on Information Science and Applications, Volume 19, 2022 - Title: Construction and Analysis of Models of Increasing Reliability for Modular Encryption Algorithm
Authors: R. Biyashev, N. Kapalova, S. Nyssanbayeva, A. Haumen
Doi: 10.37394/23204.2022.21.7
Download | Download
Published in WSEAS Transactions on Communications, Volume 21, 2022 - Title: Encryption Algorithms on BMP and JPEG Images
Authors: Sara Chillali, Lahcen Oughdir
Doi: 10.37394/232014.2022.18.3
Download | Download
Published in WSEAS Transactions on Signal Processing, Volume 18, 2022 - Title: Using AES Encryption Algorithm to Optimize High-tech Intelligent Platform
Authors: Chung-Chih Lee, Hsing-Chau Tseng, Chun-Chu Liu, Huei-Jeng Chou
Doi: 10.37394/23207.2021.18.143
Download | Download
Published in WSEAS Transactions on Business and Economics, Volume 18, 2021 - Title: A Heuristic Method to Approximate the Closest Vector Problem
Authors: Mustapha Elhassani, Abdelhakim Chillali, Ali Mouhib
Doi: 10.37394/23206.2021.20.79
Download | Download
Published in WSEAS Transactions on Mathematics, Volume 20, 2021 - Title: An Efficient Information Hiding Mechanism based on Confusion Component over Local Ring and Moore-Penrose Pseudo Inverse
Authors: Nabilah Abughazalah, Majid Khan
Doi: 10.37394/23206.2021.20.3
Download | Download
Published in WSEAS Transactions on Mathematics, Volume 20, 2021 - Title: Security Risk of Wireless Implantable Medical Devices
Authors: Steven Suggett, Lucien Ngalamou
Doi: 10.37394/23209.2020.17.10
Download | Download
Published in WSEAS Transactions on Information Science and Applications, Volume 17, 2020 - Title: IOT Supported Security Considerations for Network
Authors: K. Thamizhmaran
Doi: 10.37394/23204.2020.19.14
Download | Download
Published in WSEAS Transactions on Communications, Volume 19, 2020 - Title: Secure Image Steganography Using Tri - Way Pixel - Value Differencing on Two Cover Images
Authors: Archana O. Vyas, Sanjay V. Dudul
Download | Download
Published in WSEAS Transactions on Computers, Volume 17, 2018 - Title: Applications of Chaotic Maps and Coding for Secure Transmission of Images over Wireless Channels
Authors: Mona F. M. Mursi, Ayman H. Abd El-Aziem
Download | Download
Published in WSEAS Transactions on Computer Research, Volume 4, 2016 - Title: Reliability and Performance Assessment of Multifarious Hybrid Cryptosystems
Authors: Ijaz Ali Shoukat, Abdullah Al-Dhelaan, Mznah Al-Rodhaan, Kamalrulnizam Abu Bakar, Subariah Ibrahim
Download | Download
Published in WSEAS Transactions on Information Science and Applications, Volume 13, 2016 - Title: Supervisory Host Model: A New Paradigm to Enhance the Security and Power Management for Mobile Grid Environment
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Download | Download
Published in WSEAS Transactions on Computers, Volume 15, 2016 - Title: An Investigation of the Use of MJEA in Image Encryption
Authors: Jamal N. Bani Salameh
Download | Download
Published in WSEAS Transactions on Computers, Volume 15, 2016 - Title: Image Cryptosystem Based on Digital Signature and Double Random Phase Encoding
Authors: Hayam Abdel-Mordy, Emad S. Hassan, Sami A. El-Dolil, Fathi E. Abd El-Samie
Download | Download
Published in WSEAS Transactions on Signal Processing, Volume 11, 2015 - Title: CIADS: A Framework for Secured Storage of Patients Medical Data in Cloud
Authors: Suresh Jaganathan, Dhivya Veerappan
Download | Download
Published in WSEAS Transactions on Information Science and Applications, Volume 12, 2015 - Title: Multi-Integer Somewhat Homomorphic Encryption Scheme with China Remainder Theorem
Authors: Chao Feng, Yang Xin, Yixian Yang, Hongliang Zhu
Download | Download
Published in WSEAS Transactions on Computers, Volume 14, 2015 - Title: Secure Key Sharing in Mobile Ad Hoc Network Using Content Invisibility Scheme
Authors: A. Jegatheesan, D. Manimegalai
Download | Download
Published in WSEAS Transactions on Computers, Volume 14, 2015 - Title: Authentication Protocol for Fingerprint Feature Extraction and IBC in Monitoring Systems
Authors: Changgeng Yu, Liping Lai
Download | Download
Published in WSEAS Transactions on Communications, Volume 14, 2015 - Title: Migration of the Perfect Cipher to the Current Computing Environment
Authors: Petr Voborník
Download | Download
Published in WSEAS Transactions on Information Science and Applications, Volume 11, 2014 - Title: Implementation of Efficient Bit Permutation Box for Embedded Security
Authors: Nishchal Raval, Gaurav Bansod, Narayan Pisharoty
Download | Download
Published in WSEAS Transactions on Computers, Volume 13, 2014 - Title: Application of Improved SSL in Data Security Transmission of Mobile Database System
Authors: Ruifeng Wang, Xiaohua Zhang, Dechao Xu
Download | Download
Published in WSEAS Transactions on Communications, Volume 13, 2014 - Title: Chaotic Image Encryption via Convex Sinusoidal Map
Authors: F. Abu-Amara, I. Abdel-Qader
Download | Download
Published in WSEAS Transactions on Signal Processing, Volume 9, 2013 - Title: A Novel Image Encryption Approach Using Matrix Reordering
Authors: T. Sivakumar, R. Venkatesan
Download | Download
Published in WSEAS Transactions on Computers, Volume 12, 2013 - Title: Low Color-Depth Image Encryption Scheme for use in COTS Smartphones
Authors: Nikolaos Doukas
Download | Download
Published in WSEAS Transactions on Systems, Volume 11, 2012 - Title: FPGA Implementation of Elliptic Curve Cryptography Engine for Personal Communication Systems
Authors: M. B. I. Reaz, J. Jalil, H. Husian, F. H. Hashim
Download | Download
Published in WSEAS Transactions on Circuits and Systems, Volume 11, 2012