To search, Click below search items.
All Published Papers Search Service
Title
Matrix and Mutation Based Cryptosystem(MMC)
Author
Rajdeep Chowdhury, Arijit Saha, Pratip Kumar Biswas, Arijit Dutta
Vol. 11 No. 3 pp. 7-14
Keywords
Standard Color palette, Matrix, Mutation, Cryptosystem, Encryption, Decryption
Safe and Correctness Strategies for Updating Firewall Policies
A. Kartit, A. Radi, M. El Marraki, B. Regragui
Vol. 11 No. 3 pp. 15-20
Target Policy Deployment (TPD), Firewall Policy Management (FPM), Securing Exchanges (SE), Security of Policy Deployment (SPD)
New Approach for Modifying Blowfish Algorithm by Using Multiple Keys
Afaf M. Ali Al-Neaimi, Rehab F. Hassan
Vol. 11 No. 3 pp. 21-26
Computer security, Bluefish Algorithm, Cellular Automata, triple data encryption algorithm
A Controlled Proxy-Protected Signature Scheme with Instantaneous Revocation
Khaled Shehata, Gamal Selim, Maged Elgindy, Mohamed Mohamed Kouta
Vol. 11 No. 3 pp. 27-30
Proxy-protected, Signature, Scheme