Posts

Image
 # communication protocol # bandwidth #wirelessnetworks #mobilenetworks #cryptography #wirelesscomputing #mobilecomputing #adhocsensornetworks # telecommunications # network service Submit Your Research Articles ...!!! 15th International Conference on Wireless & Mobile Networks (WiMoNe 2023) June 17 ~ 18, 2023, Sydney, Australia Webpage URL - https://cseit2023.org/wimone/index Submission Deadline    :    April 08,2023 Submission  URL - https://cseit2023.org/submission/index.php Contact Us : wimone@cseit2023.org
Image
#wirelessnetworks #mobilenetworks #cryptography #wirelesscomputing #mobilecomputing #adhocsensornetworks #informationaccessinwirelessnetworks #ubiquitouscomputing Submit Your Research Articles ...!!! 15th International Conference on Wireless & Mobile Networks (WiMoNe 2023) June 17 ~ 18, 2023, Sydney, Australia Webpage URL - https://cseit2023.org/wimone/index Submission Deadline    :    April 01,2023 Submission  URL - https://cseit2023.org/submission/index.php Contact Us : wimone@cseit2023.org
Image
International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Submission URL: http://allcfps.com/wireilla/submission/index.php Contact Us: ijcisjournal@yahoo.com or ijcisjournal@wireilla.com
Image
 Paper Title Randomness Evaluation Framework of Cryptographic Algorithms   Authors Cristina-Loredana Duta, Bogdan-Costel Mocanu, Florin-Alexandru Vladescu and Laura Gheorghe, University Politehnica of Bucharest, Romania Abstract Nowadays, computer systems are developing very rapidly and become more and more complex, which leads to the necessity to provide security for them. This paper is intended to present software for testing and evaluating cryptographic algorithms. When evaluating block and stream ciphers one of the most basic property expected from them is to pass statistical randomness testing, demonstrating in this way their suitability to be random number generators. The primary goal of this paper is to propose a new framework to evaluate the randomness of cryptographic algorithms: based only on a .dll file which offers access to the encryption function, the decryption function and the key schedule function of the cipher that has to be tested (block cipher or strea...
Image
  Submit Your Articles Now...! 15th International Conference on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC 2023) June 17 ~ 18, 2023, Sydney, Australia https://cseit2023.org/graphhoc/index Paper Submission Authors are invited to submit papers through the conference Submission System by March 25, 2023. Submission Link https://cseit2023.org/submission/index.php #wirelessnetworks #sensornetworks #graphtheory #Algorithms #Powerassignment Contact Us Here's where you can reach us : graphhoc@cseit2023.org (or) graphhoc_conf@yahoo.com
Image
  Call For Papers...!!! International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Submission System: http://allcfps.com/wireilla/submission/index.php Contact Us: ijcisjournal@wireilla.com Submission Deadline : March 25, 2023
Image
Paper Title A Novel Authenticated Cipher for RFID Systems Authors Zahra Jeddi, Esmaeil Amini and Magdy Bayoumi, University of Louisiana at Lafayette, USA Abstract In this paper, we present RBS (Redundant Bit Security) algorithm which is a low-complexity symmetric encryption with a 132-bit secret key. In this algorithm redundant bits are distributed among plaintext data bits to change the location of the plaintext bits in the transmitted data without changing their order. The location of redundant bits inside the transmitted data represents the secret key between sender and receiver. The algorithm provides integrity and authentication of the original data as well. The implementation comparison of this algorithm with other algorithms confirms that it a good candidate for resource-constraint devices such as RFID systems and wireless sensors Keywords RFID systems, symmetric encryption algorithm, private key, authentication #RFID #RFIDsystems #symmetric #algorithm #privatekey #authenticatio...