Search Results

Results (34)

Search Parameters:

Keyword: Encryption
Order results
Results per page
Open AccessArticle
10 Pages, 2,141 KB Download PDF

A Study on Improving Security and Efficiency using Dynamic Ownership Management in Client-Side Deduplication Environments

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 267–276, 2018; DOI: 10.25046/aj030532
Abstract:

Data deduplication technology is used to improve the spatial efficiency of cloud storage. This technology is used for storing data on a cloud and omitting data uploading if the data are already present. However, various security threats may occur during the deduplication process. These security threats include poison attacks and user identity exposure through ownership.…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 319 KB Download PDF

Stream Cipher by Reed-Solomon Codes

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 26–32, 2018; DOI: 10.25046/aj030404
Abstract:

Stream cipher can be used in constrained environments to provide information security and reduce energy expense at data transmission. In this paper, it is shown that Reed-Solomon (RS) code can be used to implement stream cipher, which is widely used for error corrections of data in transmission and storages. The proposed stream cipher combines the…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 3,341 KB Download PDF

Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 271–282, 2018; DOI: 10.25046/aj030232
Abstract:

In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
10 Pages, 344 KB Download PDF

A Joint Safety and Security Analysis of message protection for CAN bus protocol

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 384–393, 2018; DOI: 10.25046/aj030147
Abstract:

One of the prominent challenges of the automotive-transportation system is represented by the integration of security and safety properties within protocols, applications and connectivity mechanisms. A joint safety/security design can sometimes expose to trade-offs, since their requirements may not match perfectly or even be incompatible. This paper analyses an example of security and safety design,…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 757 KB Download PDF

An Efficient Authentication Method For Smart Card Verification In Online

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 133–138, 2017; DOI: 10.25046/aj020418
Abstract:

The great cards are getting a charge out of a critical part inside the on-line managing wherever we have tendency to can’t check the cardholder up close and personal. The phishing sites may parody the data in the middle of the customer website and along these lines the common webpage. To protect the data and…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
4 Pages, 566 KB Download PDF

Combination of Caesar Cipher Modification with Transposition Cipher

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 22–25, 2017; DOI: 10.25046/aj020504
Abstract:

The caesar cipher modification will be combine with the transposition cipher, it would be three times encryption on this experiment that is caesar modification at first then the generated ciphertext will be encrypted with transposition, and last, the result from transposition will be encrypted again with the second caesar modification, similarly at the decryption but…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
5 Pages, 234 KB Download PDF

Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 1–5, 2017; DOI: 10.25046/aj020501
Abstract:

Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,776 KB Download PDF

A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 420–426, 2017; DOI: 10.25046/aj020354
Abstract:

Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
15 Pages, 1,137 KB Download PDF

Privacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 134–148, 2017; DOI: 10.25046/aj020116
Abstract:

Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Telecommunications (TEL))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026