EKB Journal Management System
Keywords = Encryption
Number of Articles: 18

1

Medical Image Privacy Enhancement Using Key Extension of Advanced Encryption Standard

Volume 9, Issue 3, September 2024, Page 211-216
Omar Reyad; Hanaa M. Mansour; Elnomery A. Zanaty; Mohamed Heshmat

2

Scrambled Encryption Approach for Color Images Based on 9-D Chaotic Systems with 3-D Substitution Bit Levels

Volume 4, Issue 2, June 2024, Page 1-18
Mohamed Abdel Hameed

3

Physical Layer Security Based on Cascaded Multi-Modular Chaotic Logistic Map for ML-I-NOMA Image Transmission

Volume 01, Issue 01, December 2021, Page 1-18
Esam Hagras; Ahmed Zein el-din

4

A New DNA-Based Approach for Enhancing AES using Sequence Alignment and Dynamic Multi Modeling Techniques

Volume 16, Issue 2, December 2020, Page 35-46
Abdulla Mahmoud; Mohammed Elmogy; Ahmad Atwan; Hassan Soliman

5

An Efficient Model to Encrypt Text and Gray Image Based on Amino Acid Chains

Volume 7, Issue 2, September 2020, Page 20-31
Mohammed Nasef; Amr Sauber; Ahmed Sakr; Khaled Geba

6

A Hybrid Modified Advanced Encryption Standard and Chaos Encryption Algorithm for Securing Compressed Multimedia Data

Volume 28, ICEEM2019-Special Issue, 2019, Page 63-70
Ahmed K. Mesrega; Walid El-Shafai; Hossam Eldin H. Ahmed; Nirmeen A. El-Bahnasawy; Fathi E. Abd El-Samie; Abdulaziz E. Elfiqi

7

Chaotic Encryption of ECG Signals with a Random Kernel Approach

Volume 28, ICEEM2019-Special Issue, 2019, Page 115-121
Samer Amr; Hossam El din Hussein; Noha Ramadan; Walid El-Shafai; Waleed El-Hanafy; Fathi E. Abd El-Samie

8

Enhanced Security of the Internet of Medical Things (IOMT)

Volume 14, Issue 2, December 2018, Page 1-10
I.S. Farahat; A. S. Tolba; Waleed Eladrosy

9

A Robust Satellite Imagery On-Board Security System

Volume 9, Issue 1, 2018, Page 77-89

10

A Speech Cryptosystem Based on Chaotic Modulation Technique

Volume 4, Issue 1, April 2017, Page 1-10
Mahmoud Fawzy; Mohamed Shalaby; Yasser Kamal; Salwa Hussein Elramly

11

AN EFFICIENT DISTRIBUTED KEY GENERATION PROTOCOL FOR TRANSIENT CLOUDS

Volume 12, Issue 42, January 2017, Page 131-143
Mona Samir Lackousha; Hisham Dahshan; Nabil Hamdy Shaker

12

Secure Enhanced User Authentication Protocol for Cloud Computing Environment

Volume 16, AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT - 16 – May 26 - 28, 2015, May 2015, Page 1-9
Mona Samir Lackousha; Nabil Hamdy Shaker; Hisham Dahshan

13

Design and Implementation of an Optimized Encryption Algorithm for Performance Enhancement Over WiMAX

Volume 9, 9th International Conference on Electrical Engineering ICEENG 2014, May 2014, Page 1-9
I. Abd Elgafar; E. Abd Elwanees; A. D. Elbayoumy; H. Eldemerdash

14

New Encryption Method Based on Using The Kharaghani Array of Order 8

Volume 8, 8th International Conference on Electrical Engineering ICEENG 2012, May 2012, Page 1-9
Manal A. Shehab; Noha O. Korany

15

A PROPOSED ARCHITECTURE FOR STREAM CIPHERS USING LFSR AND FCSR

Volume 5, 5th International Conference on Electrical Engineering ICEENG 2006, May 2006, Page 1-10
N. Shaker; K. Shehata; T. Elshafiey; A. Alshobaki

16

DESIGN OF PIPELINED AES ENCRYPTION ALGORITHM USING FPGA

Volume 5, 5th International Conference on Electrical Engineering ICEENG 2006, May 2006, Page 1-24
Alaa El Din Rohiem; Kamel Mohamed Hassan; Ahmed M. El-Amin

17

A Modified Polyalphabetic Technique for Arabic Letters Encryption

Volume 16, Issue 1, January 2006, Page 107-113
Dr. M. M. Abdelmoniem

18

VOICE MAIL ENCRYPTION USING INTERNATIONAL DATA ENCRYPTION ALGORITHM

Volume 2, 2nd International Conference on Electrical Engineering ICEENG 1999, November 1999, Page 65-71
ASHRAF D. E.; EMAD A. F.; MOHAMED S. E.