A Chaos-Based Encryption Algorithm for Database System
Abstract: This paper introduces a new Database Transposition, Substitution and XORing Algorithm (DTSXA) based on using chaotic maps. It is
Read MoreAbstract: This paper introduces a new Database Transposition, Substitution and XORing Algorithm (DTSXA) based on using chaotic maps. It is
Read MoreAbstract: Environmental factors such as channel noise and hardware fingerprints affect the encryption effect of physical layer key generation techniques,
Read MoreAbstract: In this study, we propose an optimized network information security evaluation GRA-BPNN model based on gray correlation analysis method
Read MoreAbstract: Cybercrime has become the most widespread kind of economic fraud and is a serious challenge for businesses around the
Read MoreAbstract: The involvement of the Internet in the production of daily life has increased the demand for the security of
Read MoreAbstract: The presence of anomalous traffic on the network causes some dangers to network security. To address the issue of
Read MoreAbstract: The BB84 quantum key distribution (QKD) protocol is based on the no-cloning quantum physic property, so if an attacker
Read MoreAbstract: Technological developments make it easier for people to communicate and share information. Facebook Messenger is an instant messenger that
Read MoreAbstract: Ransomware is a type of revenue-generating tactic that cybercriminals utilize to improve their income. Businesses have spent billions of
Read MoreAbstract: In this day and age, Internet has become an innate part of our existence. This virtual platform brings people
Read More