An intelligent tutoring system for teaching advanced topics in information security
Recently there is an increasing technological development in intelligent tutoring systems.
This field has become interesting to many researchers. In this paper, we present an …
This field has become interesting to many researchers. In this paper, we present an …
Learning computer networks using intelligent tutoring system
MM Al-Hanjori, MZ Shaath, SSA Naser - 2017 - philpapers.org
Abstract Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate,
education, health, training, and educational programs. In this paper we describe an …
education, health, training, and educational programs. In this paper we describe an …
ITS for teaching DES information security Algorithm
AEA Alnajar, M Hanjory - 2017 - philpapers.org
Lately there is more attention paid to technological development in intelligent tutoring
systems. This field is becoming an interesting topic to many researchers. In this paper, we …
systems. This field is becoming an interesting topic to many researchers. In this paper, we …
An intelligent tutoring system for teaching French
RA Khella, SS Abu-Naser - 2018 - philpapers.org
The paper depicts the blueprint of an electronic wise indicating system for demonstrating
learning French to understudies to overcome the inconveniences they go up against. The …
learning French to understudies to overcome the inconveniences they go up against. The …
A modified hill cipher based on circulant matrices
KA Reddy, B Vishnuvardhan, AVN Krishna - Procedia Technology, 2012 - Elsevier
Secured communication of text information is prime importance across the globe.
Cryptography is one of the methods to attain security. The Hill cipher is a symmetric …
Cryptography is one of the methods to attain security. The Hill cipher is a symmetric …
[PDF][PDF] Optimal ordering of analog integrated circuit tests to minimize test time
SD Huss, RS Gyurcsik - Proceedings of the 28th ACM/IEEE Design …, 1991 - dl.acm.org
This paper describes an algorithm that uses dynamic programming to order IC tests so that
faulty circuits are detected early in the test sequence and the average test time is minimized …
faulty circuits are detected early in the test sequence and the average test time is minimized …
[PDF][PDF] Security enhancement of hill cipher by using non-square matrix approach
The conventional Hill cipher provides less information security due to fixed NN× key matrix
dimensions. In this paper, a new modified Hill cipher is introduced which provides enhanced …
dimensions. In this paper, a new modified Hill cipher is introduced which provides enhanced …
[PDF][PDF] Hill cipher modification based on pseudo-random eigenvalues
A Mahmoud, A Chefranov - Applied Mathematics & …, 2014 - naturalspublishing.com
The Hill cipher is resistant to brute-force and statistical attacks, but it can be broken with a
known plaintext-ciphertext attack (KPCA). In this paper, we propose a modification of the Hill …
known plaintext-ciphertext attack (KPCA). In this paper, we propose a modification of the Hill …
A property-based testing framework for encryption programs
C Sun, Z Wang, G Wang - Frontiers of Computer Science, 2014 - Springer
In recent years, a variety of encryption algorithms were proposed to enhance the security of
software and systems. Validating whether encryption algorithms are correctly implemented …
software and systems. Validating whether encryption algorithms are correctly implemented …
Hybrid approach of image encryption using DNA cryptography and TF Hill Cipher Algorithm
RK Jangid, N Mohmmad, A Didel… - … on Communication and …, 2014 - ieeexplore.ieee.org
The Hill cipher algorithm is one of the symmetric key algorithms that have many variations
but still not suited for all zeroes plaintext block. Chosen-plaintext attack can be possible on …
but still not suited for all zeroes plaintext block. Chosen-plaintext attack can be possible on …