A Chaos-Based Encryption Algorithm for Database System
Abstract: This paper introduces a new Database Transposition, Substitution and XORing Algorithm (DTSXA) based on using chaotic maps. It is
Read moreAbstract: This paper introduces a new Database Transposition, Substitution and XORing Algorithm (DTSXA) based on using chaotic maps. It is
Read moreAbstract: Environmental factors such as channel noise and hardware fingerprints affect the encryption effect of physical layer key generation techniques,
Read moreAbstract: In this study, we propose an optimized network information security evaluation GRA-BPNN model based on gray correlation analysis method
Read moreAbstract: Cybercrime has become the most widespread kind of economic fraud and is a serious challenge for businesses around the
Read moreAbstract: The involvement of the Internet in the production of daily life has increased the demand for the security of
Read moreAbstract: The presence of anomalous traffic on the network causes some dangers to network security. To address the issue of
Read moreAbstract: The BB84 quantum key distribution (QKD) protocol is based on the no-cloning quantum physic property, so if an attacker
Read moreAbstract: Technological developments make it easier for people to communicate and share information. Facebook Messenger is an instant messenger that
Read moreAbstract: Ransomware is a type of revenue-generating tactic that cybercriminals utilize to improve their income. Businesses have spent billions of
Read moreAbstract: In this day and age, Internet has become an innate part of our existence. This virtual platform brings people
Read more