Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Roayat Ismail Abdelfatah"'
Autor:
Roayat Ismail Abdelfatah
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 5, Pp 102062- (2024)
A significant problem facing cybersecurity is that most client/server identity authentication schemes depend on computational complexity which is recently challenged by the super exponential computational abilities of quantum computers. Quantum crypt
Externí odkaz:
https://doaj.org/article/75ad54bfee334c7788eae210246b9878
Autor:
Roayat Ismail Abdelfatah
Publikováno v:
IEEE Access, Vol 10, Pp 107152-107169 (2022)
Recently, quantum image encryption algorithms are attracting more and more attention, due to the upcoming quantum threat problem to the current cryptographic encryption algorithms with the rapid progress toward the quantum computer production. The ai
Externí odkaz:
https://doaj.org/article/6a17ee6d965a403685fe198436113426
Publikováno v:
IEEE Access, Vol 9, Pp 130399-130409 (2021)
Hash functions are considered as the core of cryptography, which are the basic technique used for data security. Cryptographic hash functions also can be used to achieve the integrity of large data such as the data stored in a hard disk and set of fi
Externí odkaz:
https://doaj.org/article/0bfc0d1d85884f318b7d3fc1b083871b
Autor:
Roayat Ismail Abdelfatah
Publikováno v:
IEEE Access, Vol 8, Pp 3875-3890 (2020)
In this paper, a novel scheme for secure and real time image transmission is introduced. The scheme uses a block-based elliptic curve (BBEC) public key encryption as a first stage of encryption so it solves the key distribution and management problem
Externí odkaz:
https://doaj.org/article/6c5e848c7f9243a697dc829c91a9059b
Autor:
Roayat Ismail Abdelfatah
Publikováno v:
IEEE Access, Vol 8, Pp 69894-69907 (2020)
In this paper, a novel scheme for secure audio transmission is introduced. The novelty of this scheme is that it combines four different techniques for audio encryption in the same scheme which makes it more secure: self-adaptive scrambling, multi ch
Externí odkaz:
https://doaj.org/article/837b63f7b17d4409b6ed2639c3ad6924
Publikováno v:
Multimedia Tools and Applications. 82:22213-22227
A Wireless Body Area Network (WBAN) is a network of wireless sensor nodes that can be installed inside or outside of the human body. This network is crucial in medical problems. Due to storage, battery power, and computational resource limitations, t
Publikováno v:
Multimedia Tools and Applications. 82:22229-22229
Publikováno v:
IEEE Access, Vol 9, Pp 130399-130409 (2021)
Hash functions are considered as the core of cryptography, which are the basic technique used for data security. Cryptographic hash functions also can be used to achieve the integrity of large data such as the data stored in a hard disk and set of fi
Autor:
Roayat Ismail Abdelfatah
Publikováno v:
Multimedia Tools and Applications. 79:24731-24756
A robust secure image transmission scheme has to achieve all the security services as confidentiality, authentication, integrity and nonrepudiation with a reasonable efficiency. An authenticated image encryption scheme which achieves all these servic
Publikováno v:
Multimedia Tools and Applications. 79:19717-19738
This paper proposes several efficient techniques for multimedia encryption based on a chaotic map. The proposed techniques use four types of chaotic maps and make combinations between them using serial or parallel connections. For all combinations pr