EKB Journal Management System
Keywords = Cryptography
Number of Articles: 26

1

Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment

Articles in Press, Accepted Manuscript , Available Online from 12 October 2023
Ageebee Silas FAKI; Musa Yusuf; Ishaya Oluwasegun Adelaiye

2

Evaluation of Advanced Information Security Scheme in Internet of Things Environment for Intelligent Monitoring Applications

Volume 3, Issue 1, January 2024, Page 1-21
Mohamed Gaber; Ashraf Khalaf; Imbaby Mahmoud; Mohamed El Tokhy

3

Survey Image Cryptanalysis Using a Substitution Box Based Chaotic Map

Volume 03, Issue 02, September 2023, Page 1-12
Ahmed Rabea; Mohamed Abdelfattah; Ali Takieldeen; Abeer Khalil

4

Cryptography utilizing the Affine-Hill cipher and Extended Generalized Fibonacci matrices

Volume 11, Issue 2, July 2023, Page 1-12
Vaishali Billore; Naresh Patel

5

Review Article: Cryptographic Algorithms for Enhancing Security in Cloud Computing.

Volume 4, Issue 3, July 2023, Page 433-455
Doaa Salah El-Morshedy; Noha Ezzat El-Attar; Ibrahim Mohamed Hanafy; W.A. Awad

6

Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment

Volume 5, Issue 1, June 2023, Page 2-9
Yusuf, Musa; FAKI, Ageebee Silas; Adelaiy e; Ishaya Oluwasegun

7

Comparison Study Between Simple LSB and Optimal LSB Image Steganography

Volume 8, Issue 1, January 2023, Page 29-33
Marghny H. Mohamed; Mahmoud A. Mofaddel; Tarek Y. Abd El-Naser

8

Using CryptoBin Encryption Algorithm in Military Applications

Volume 01, Issue 01, December 2021, Page 1-7
Ahmed Eltengy; Hamed Zied

9

NETWORK SECURITY BY BLOCK CIPHERS

Volume 15, Issue 57, October 2020, Page 981-991
Mohamed Hussein Mohamed Hassan

10

LCA- Lightweight Cryptographic Algorithm for IoT Constraint Resources

Volume 28, ICEEM2019-Special Issue, 2019, Page 374-380
Bassam Aboshosha; Mohamed Dessouky; Rabie Ramadan; Ayman A EL-SAYED

11

A DNA Based Image Data Hiding Using 3D Logistic Chaotic Map

Volume 15, Issue 2, December 2019, Page 35-44
Zeinab Awad; Magdy Zakria; Rasha Hassan

12

Immunity of Lightweight DES Algorithm (DESL) Against Linear Cryptanalysis Attack

Volume 28, ICEEM2019-Special Issue, 2019, Page 381-387
Bassam Aboshsha; Mohamed Dessouky; Rabie Ramadan; Ayman EL-SAYED

13

A Robust Satellite Imagery On-Board Security System

Volume 9, Issue 1, 2018, Page 77-89

14

A Biometric Cryptographic System based on Fingerprint signature

Volume 9, Issue 1, 2018, Page 1-19

15

Selective Video Encryption System using AES (Rijndael) Algorithm Using FPGA

Volume 9, 9th International Conference on Electrical Engineering ICEENG 2014, May 2014, Page 1-6
I. Kamal. Ismail; Ehab. A. Elsehely; Ahmed. E. Abdalla

16

A Low cost FPGA implementation of real time video cryptography system using AES (Rijndael) algorithm.

Volume 8, 8th International Conference on Electrical Engineering ICEENG 2012, May 2012, Page 1-12
I. Kamal. Ismail; Ehab. A. Elsehely; A. E. Abdulla

17

A Novel S-box Substitution Technique for AES Algorithm

Volume 8, 8th International Conference on Electrical Engineering ICEENG 2012, May 2012, Page 1-15
Faiz Yousif Mohamed; M. E. Gadallah; Alaa Eldin Rohiem; Ashraf Diaa Elbayoumy

18

Exchanging Encrypted Documents Through Fax Machines

Volume 5, Issue 1, 2011, Page 37-48

19

A Stego-Crypto-Based Technique for Multimedia Transmission

Volume 5, Issue 1, 2011, Page 21-36

20

Blowfish cryptography implementation by using Microcontroller

Volume 7, 7th International Conference on Electrical Engineering ICEENG 2010, May 2010, Page 1-6
Ali E. Taki El_Deen; I N. A. Hikal

21

A Novel S-box of AES Algorithm Using Variable Mapping Technique

Volume 13, AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT- 13, May 26 – 28, 2009, May 2009, Page 1-10
Faiz Yousif Mohammad; Alaa Eldin Rohiem; Ashraf Diaa Elbayoumy

22

Security evaluation of VoIP cryptographic algorithms

Volume 6, 6th International Conference on Electrical Engineering ICEENG 2008, May 2008, Page 1-12
Faiz Yousif Mohmmed; Alaa Eldin Rohiem; Ashraf Diaa Elbayoumy

23

FPGA versus ASIC Implementation of Radix-8 Scalable Montgomery Modular Multiplier.

Volume 32, Issue 3, September 2007, Page 1-16
Atef A. Ibrahim; Hamed A. ElSemary; Amen M. Nassar

24

FPGA versus ASIC Implementation of Radix-4 Scalable Montgomery Modular Multiplier.

Volume 31, Issue 3, September 2006, Page 27-33
Atef A. Ibrahim; Hamed A. El-Simary; Amen M. Nassar

25

Efficient Uses of FPGAS for Hardware Implementation of Data Encryption Standard

Volume 5, 5th International Conference on Electrical Engineering ICEENG 2006, May 2006, Page 1-10
Aly E. Salama; Fawzy H. Aly; M. Nabil.

First Page Previous Page 1 2 Next Page Last Page