• Login
    Search 
    •   DSpace Home
    • ADU Repository
    • Engineering
    • Search
    •   DSpace Home
    • ADU Repository
    • Engineering
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 24

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Enhancing protection techniques of e-banking security services using open source cryptographic algorithms 

    Khelifi, Adel; Aburrous, Maher; Abu Talib, Manar; Shastry, PVS (IEEE, 2013-07)
    Security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long time ...
    Thumbnail

    Open Source Cryptographic Algorithm to Better Secure E-Banking Services and Enhance its Protection Techniques 

    Khelifi, Adel; Aburrous, Maher; Shastry, PVS; S Sutaone, Mukul (ResearchGate, 2013-07)
    The security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long ...
    Thumbnail

    An Image Encryption Scheme based on Hybridizing Digital Chaos and Finite State Machine 

    Alawida, Moatsum; Teh, Je Sen; Alshoura, Wafa' Hamdan (Elsevier, 2019-11)
    Image encryption protects visual information by transforming images into an incomprehensible form. Chaotic systems are used to design image ciphers due to properties such as ergodicity and initial condition sensitivity. A ...
    Thumbnail

    A new hybrid digital chaotic system with applications in image encryption 

    Alawida, Moatsum; Samsudin, Azman; Sen Teh, Je; S Alkhawaldeh, Rami (Elsevier, 2019-07)
    Image encryption provides confidentiality to images by transforming them into unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to design image ciphers due to its many desirable properties ...
    Thumbnail

    Implementation and practical problems of chaos-based cryptography revisited 

    Sen Teh, Je; Alawida, Moatsum; Cheng, sii you (Elsevier, 2020-02)
    Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios are minimal as compared to conventional ...
    Thumbnail

    A chaos-based keyed hash function based on fixed point representation 

    Sen Teh, Je; Tan, Kaijun; Alawida, Moatsum (Springer, 2019-05)
    Chaotic maps are used in the design of hash functions due to their characteristics that are analogous to cryptographic requirements. However, these maps are commonly implemented using floating point representation which ...
    Thumbnail

    Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic 

    Sen Teh, Je; Alawida, Moatsum; Jie Ho, Jia (Springer Netherlands, 2020)
    Chaotic maps have various properties that mirror the security requirements of cryptographic algorithms. As such, researchers have utilized them in the design of algorithms such as hash functions. Although there exist a ...
    Thumbnail

    Enhancing unimodal digital chaotic maps through hybridisation 

    Alawida, Moatsum; Samsudin, Azman; Sen Teh, Je (Springer Netherlands, 2019-04)
    Despite sharing many similar properties with cryptography, digitizing chaotic maps for the purpose of developing chaos-based cryptosystems leads to dynamical degradation, causing many security issues. This paper introduces ...
    Thumbnail

    A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence 

    Alawida, Moatsum; Samsudin, Azman; Alajarmeh, Nancy; Sen Teh, Je; ETAL.. (IEEE Access, 2021)
    Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims. We address this problem by proposing a hash function based on a ...
    Thumbnail

    A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata 

    Alawida, Moatsum; Sen Teh, Je; Oyinloye, Damilare Peter; Wafa' Hamdan, Alshoura (IEEE Access, 2020-07)
    In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward ...
    • 1
    • 2
    • 3

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Discover

    AuthorAlawida, Moatsum (9)Chaudhry, Shehzad Ashraf (9)Sen Teh, Je (8)ETAL.. (6)Irshad, Azeem (5)Samsudin, Azman (4)Sher, Muhammad (3)Aburrous, Maher (2)Ahmad, Hafiz Farooq (2)Chen, Chi (2)... View MoreSubject
    Cryptography (24)
    Authentication (8)Chaos theory (5)Multi-server authentication (4)Servers (4)Attacks (3)Chaotic map (3)Chebyshev chaotic map (3)Hash functions (3)Image encryption (3)... View MoreDate Issued2020 (6)2019 (5)2021 (4)2018 (3)2013 (2)2014 (1)2015 (1)2016 (1)2022 (1)Has File(s)No (22)Yes (2)

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV