Volume 24 (2024)
Volume 23 (2023)
Volume 22 (2022)
Volume 21 (2021)
Volume 20 (2020)
Volume 19 (2019)
Volume 18 (2018)
Volume 17 (2017)
Volume 16 (2016)
Volume 15 (2015)
Volume 14 (2014)
Volume 13 (2013)
Volume 12 (2012)
Volume 11 (2011)
Volume 10 (2010)
Volume 9 (2009)
Volume 8 (2008)
Volume 7 (2007)
Volume 6 (2006)
Volume 5 (2005)
Volume 4 (2004)
Keywords = Cryptography
Number of Articles: 4
Proposed Pseudo Random Generator Based on RC5 Block Cipher
Volume 17, Issue 1 , December 2017, , Page 33-41
Abstract
Digital cryptography relies greatly on randomness in providing the security requirements imposed by various information systems. Just as different requirements call for specific cryptographic techniques, randomness takes upon a variety of roles in order to ensure the proper strength of these cryptographic ... Read More ...Modification of RC5 Algorithm for Image Encryption
Volume 14, Issue 2 , August 2014, , Page 62-71
Abstract
Abstract – Encryption is mainly used to transmit the data over networks. There are so many techniques introduced which are used to protect the confidential image data from any unauthorized access. Multimedia data contains different types of data that includes text, audio, video, graphic, and images ... Read More ...Information Hiding in Image Based on Random Locations
Volume 12, Issue 2 , December 2012, , Page 9-15
Abstract
Abstract: Network Security for data transmission is the most vital issue in modern communication systems. This paper discusses a new steganographic technique and the effectiveness of the proposed method is described through which the idea of enhanced security of data can be achieved. To hide data in ... Read More ...AN IMPROVED DATA CONFIDENTIALITY PROTOCOL BASED ON TIMESTAMP
Volume 12, Issue 1 , June 2012, , Page 53-59