An intelligent tutoring system for teaching advanced topics in information security
Recently there is an increasing technological development in intelligent tutoring systems.
This field has become interesting to many researchers. In this paper, we present an …
This field has become interesting to many researchers. In this paper, we present an …
Learning computer networks using intelligent tutoring system
MM Al-Hanjori, MZ Shaath, SSA Naser - 2017 - philpapers.org
Abstract Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate,
education, health, training, and educational programs. In this paper we describe an …
education, health, training, and educational programs. In this paper we describe an …
ITS for teaching DES information security Algorithm
AEA Alnajar, M Hanjory - 2017 - philpapers.org
Lately there is more attention paid to technological development in intelligent tutoring
systems. This field is becoming an interesting topic to many researchers. In this paper, we …
systems. This field is becoming an interesting topic to many researchers. In this paper, we …
An intelligent tutoring system for teaching French
RA Khella, SS Abu-Naser - 2018 - philpapers.org
The paper depicts the blueprint of an electronic wise indicating system for demonstrating
learning French to understudies to overcome the inconveniences they go up against. The …
learning French to understudies to overcome the inconveniences they go up against. The …
Generation of high-order random key matrix for Hill Cipher encryption using the modular multiplicative inverse of triangular matrices
Y Chen, R Xie, H Zhang, D Li, W Lin - Wireless Networks, 2024 - Springer
Hill Cipher is one of the classic symmetric encryption algorithms widely used in cloud data
security. Although the hill cipher principle is relatively simple, its key matrix must be …
security. Although the hill cipher principle is relatively simple, its key matrix must be …
Development of Matrix Cipher Modifications and Key Exchange Protocol
AYA Mahmoud - 2012 - i-rep.emu.edu.tr
In modern cryptographic methods, keys are the basis for secure communication channels
and the establishment of secret keys is a challenging problem for the large-scale …
and the establishment of secret keys is a challenging problem for the large-scale …
Securing JPEG architecture based on enhanced chaotic hill cipher algorithm
In the last two decades, Chaos theory has received a great deal of attention from the
cryptographic community. This paper presents two ideas. First idea is using chaotic functions …
cryptographic community. This paper presents two ideas. First idea is using chaotic functions …
Encryption based on multilevel security for relational database EBMSR
AY Mahmoud, MNA Alqumboz - 2019 International Conference …, 2019 - ieeexplore.ieee.org
Cryptography is one of the most important sciences today because of the importance of data
and the possibility of sharing data via the Internet. Therefore, data must be preserved when …
and the possibility of sharing data via the Internet. Therefore, data must be preserved when …
Secure, Fast, and Loss-Tolerant Communication with Hill Cipher and Network Coding
H Nishida - 2023 IEEE 14th Annual Ubiquitous Computing …, 2023 - ieeexplore.ieee.org
This paper presents a novel approach that combines a modified Hill Cipher (HC) with
Random Network Coding (RNC) to achieve secure and loss-tolerant one-to-one …
Random Network Coding (RNC) to achieve secure and loss-tolerant one-to-one …
Advanced Hill Cipher Hybrid Cryptography Model
HS Chilakala, N Preeti, K Murali - 2022 IEEE North Karnataka …, 2022 - ieeexplore.ieee.org
Information, which includes transactions, knowledge, communications, databases, and
infrastructure, is an organization's asset and should be protected. Information and …
infrastructure, is an organization's asset and should be protected. Information and …