[HTML][HTML] Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security

H Kadry, A Farouk, EA Zanaty, O Reyad - Alexandria Engineering Journal, 2023 - Elsevier
Secure data transmission in wireless mesh networks is a necessary attribute for machine
learning-based intrusion detection systems (IDS). Numerous attacks may have an adverse …

[HTML][HTML] An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)

FO Mojisola, S Misra, CF Febisola… - Egyptian Informatics …, 2022 - Elsevier
The recent innovations in network application and the internet have made data and network
security the major role in data communication system development. Cryptography is one of …

A true random number generator based on double threshold-switching memristors for image encryption

J Bian, Y Tao, Z Wang, Y Dong, Z Li, X Zhao… - Applied Physics …, 2023 - pubs.aip.org
True random number generator (TRNG) that cannot be arbitrary attacked with predictable
software algorithm is a promising data security solution. Memristors, possessing specific …

Secured cloud SCADA system implementation for industrial applications

FA Osman, MYM Hashem, MAR Eltokhy - Multimedia Tools and …, 2022 - Springer
Abstract The proposed Remote SCADA System (RSS) is a smarter, faster and more reliable
way to control high power machines and monitor their sensors, data, and failures. The …

Design, analysis, and implementation of a new lightweight block cipher for protecting IoT smart devices

AAM Ragab, A Madani, AM Wahdan… - Journal of Ambient …, 2023 - Springer
Abstract A modified XXTEA “M-XXTEA” symmetric block cipher that has a simple
construction compared to the advanced encryption standard (AES) is proposed. It is efficient …

[PDF][PDF] Secure key exchange against man-in-the-middle attack: Modified diffie-hellman protocol

M Kara, A Laouid, M AlShaikh… - Jurnal Ilmiah Teknik …, 2021 - researchgate.net
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a
widely used technique on which key exchange systems around the world depend. This …

Security enhancement of AES-CBC and its performance evaluation using the avalanche effect

HT Assafli, IA Hashim - 2020 3rd International Conference on …, 2020 - ieeexplore.ieee.org
The security of communication systems is becoming a significant concern with the increase
in computational power. High-security cryptographic algorithms are required to protect the …

Secure framework for IoT technology based on RSA and DNA cryptography

MM Elamir, MS Mabrouk, SY marzouk - Egyptian Journal of Medical …, 2022 - Springer
Abstract Background The Internet of things (IoT) is the network of different objects or “things”
containing sensors, software, and other technologies used to exchange data between …

Novel image pixel scrambling technique for efficient color image encryption in resource-constrained IoT devices

C İnce, K İnce, D Hanbay - Multimedia Tools and Applications, 2024 - Springer
In the digital age, where data is a valuable commodity, securing sensitive information has
become a growing concern. Image encryption techniques play an essential role in protecting …

Power system real time data encryption system based on DES algorithm

A Cui, H Zhao, X Zhang, B Zhao… - 2021 13th International …, 2021 - ieeexplore.ieee.org
To ensure the safe operation of power system, this paper studies two technologies of data
encryption and digital signature, and designs a real-time data encryption system based on …