An intelligent tutoring system for teaching advanced topics in information security

AO Mahdi, MI Alhabbash, SSA Naser - 2016 - philpapers.org
Recently there is an increasing technological development in intelligent tutoring systems.
This field has become interesting to many researchers. In this paper, we present an …

Learning computer networks using intelligent tutoring system

MM Al-Hanjori, MZ Shaath, SSA Naser - 2017 - philpapers.org
Abstract Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate,
education, health, training, and educational programs. In this paper we describe an …

ITS for teaching DES information security Algorithm

AEA Alnajar, M Hanjory - 2017 - philpapers.org
Lately there is more attention paid to technological development in intelligent tutoring
systems. This field is becoming an interesting topic to many researchers. In this paper, we …

An intelligent tutoring system for teaching French

RA Khella, SS Abu-Naser - 2018 - philpapers.org
The paper depicts the blueprint of an electronic wise indicating system for demonstrating
learning French to understudies to overcome the inconveniences they go up against. The …

Generation of high-order random key matrix for Hill Cipher encryption using the modular multiplicative inverse of triangular matrices

Y Chen, R Xie, H Zhang, D Li, W Lin - Wireless Networks, 2024 - Springer
Hill Cipher is one of the classic symmetric encryption algorithms widely used in cloud data
security. Although the hill cipher principle is relatively simple, its key matrix must be …

Development of Matrix Cipher Modifications and Key Exchange Protocol

AYA Mahmoud - 2012 - i-rep.emu.edu.tr
In modern cryptographic methods, keys are the basis for secure communication channels
and the establishment of secret keys is a challenging problem for the large-scale …

Securing JPEG architecture based on enhanced chaotic hill cipher algorithm

G Hamissa, A Sarhan, H Abdelkader… - The 2011 International …, 2011 - ieeexplore.ieee.org
In the last two decades, Chaos theory has received a great deal of attention from the
cryptographic community. This paper presents two ideas. First idea is using chaotic functions …

Encryption based on multilevel security for relational database EBMSR

AY Mahmoud, MNA Alqumboz - 2019 International Conference …, 2019 - ieeexplore.ieee.org
Cryptography is one of the most important sciences today because of the importance of data
and the possibility of sharing data via the Internet. Therefore, data must be preserved when …

Secure, Fast, and Loss-Tolerant Communication with Hill Cipher and Network Coding

H Nishida - 2023 IEEE 14th Annual Ubiquitous Computing …, 2023 - ieeexplore.ieee.org
This paper presents a novel approach that combines a modified Hill Cipher (HC) with
Random Network Coding (RNC) to achieve secure and loss-tolerant one-to-one …

Advanced Hill Cipher Hybrid Cryptography Model

HS Chilakala, N Preeti, K Murali - 2022 IEEE North Karnataka …, 2022 - ieeexplore.ieee.org
Information, which includes transactions, knowledge, communications, databases, and
infrastructure, is an organization's asset and should be protected. Information and …