Posts

Showing posts from June, 2022
Image
Call for papers...!!! 14th International Conference on Wireless & Mobile Network (WiMo 2022) July 23~24, 2022, Toronto, Canada https://www.itcse2022.org/wimo/index Submission Deadline: July 02, 2022 (final call) Contact Us: Here's where you can reach us : wimo@itcse2022.org or wimo.conf@yahoo.com https://www.itcse2022.org/submission/index.php  
On the Cryptographic Measures and Chaotic Dynamical Complexity Measures   1Hanping Hu, 2 LingFeng Liu 1, 2Institute of Pattern Recognition & Artificial Intelligence, Huazhong University of Science &Technology, Wuhan, PRC Abstract The relationship between cryptographic measures and chaotic dynamical complexity measures is studied in this paper, including linear complexity and measure entropy, nonlinear complexity and source entropy. Moreover, a method is presented to guarantee the complexity of chaos-based pseudorandom sequence due to this relationship. This is important to the development of chaos-based cryptography. Keywords Chaos-based cryptography, Cryptographic measures, Linear complexity, Nonlinear complexity, Chaotic dynamical complexity measures, Measure entropy, Source entropy Pdf Url https://wireilla.com/papers/ijcis/V2N4/2412ijcis03.pdf
Image
  Call For Papers...!!! International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: http://airccse.org/journal/ijcis/index.html Submission System: ijcisjournal@wireilla.com or through  Submission System: http://allcfps.com/wireilla/submission/index.php Indexing URL: https://wireilla.com/ijcis/indexing.html Contact Us: ijcisjournal@yahoo.com Submission Deadline : July 02, 2022
Image
  Call for Paper!... 2nd International Conference on Cryptography and Blockchain (CRBL 2022) October 22 ~ 23, 2022, Sydney, Australia https://comit2022.org/crbl/index Submission URL: https://comit2022.org/submission/index.php Submission deadline: June 25, 2022 Contact us: Here's where you can reach us : crbl@comit2022.org or crblconf@yahoo.com
New Digital Signature Protocol Based on Elliptic Curves Ounasser Abid1 , Jaouad Ettanfouhi2 and Omar Khadir3 1,2,3Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm , University of Hassan II Mohammedia-Casablanca, Morocco. Abstract In this work, a new digital signature based on elliptic curves is presented. We established its efficiency and security. The method, derived from a variant of ElGamal signature scheme, can be seen as a secure alternative protocol if known systems are completely broken. Keywords Public key cryptography, Digital signature, ElGamal signature scheme, Elliptic curves, Discrete logarithm problem. Pdf Url https://wireilla.com/papers/ijcis/V2N4/2412ijcis02.pdf
Image
Call For Papers...!!! International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: http://airccse.org/journal/ijcis/index.html Submission System: ijcisjournal@wireilla.com or through  Submission System: http://allcfps.com/wireilla/submission/index.php Contact Us: ijcisjournal@yahoo.com Submission Deadline : June 25, 2022  
Image
 #Cryptography #Informationsecurity #Authentication #Dataintegrity #Security #Webservices Call for Research Papers! 11th International Conference on Cryptography and Information Security (CRYPIS 2022) July 23~24, 2022, Toronto, Canada https://www.itcse2022.org/crypis/index Submission Deadline: June 18, 2022 Contact Us Here's where you can reach us : crypis@itcse2022.org or crypis.conf@yahoo.com Submission System: https://www.itcse2022.org/submission/index.php
Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using Input-Data Cleansing Algorithm S. Fouzul Hidhaya1, 2 and Angelina Geetha1, 3  1 Department of Computer science and Engineering, B.S. Abdur Rahman University, Chennai, Tamilnadu, India. Abstract Internet has eased the life of human in numerous ways, but the drawbacks like the intrusions that are attached with the Internet applications sustains the growth of these applications. Hackers find new methods to intrude the applications and the web application vulnerability reported is increasing year after year. One such major vulnerability is the SQL Injection attacks (SQLIA). Since SQLIA contributes 25% of the total Internet attacks, much research is being carried out in this area. In this paper we propose a method to detect the SQL injection. We deploy a Reverse proxy that uses the input-data cleansing algorithm to mitigate SQL Injection Attack. This system has been tested on standard test bed applications and...
Image
Call for Article....! International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Paper Title: An Improved Certified E Mail Protocol Based on Author Based Selective Receipt   Website URL: https://wireilla.com/ijcis/index.html Volume URL: https://airccse.org/journal/ijcis/current2012.html Paper URL: https://wireilla.com/papers/ijcis/V2N4/2412ijcis07.pdf Submission through Email: ijcisjournal@wireilla.com   Submission Link: http://coneco2009.com/submissions/imagination/home.html Here's where you can reach us: ijcisjournal@yahoo.com  
Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption S G Srikantaswamy1 and Dr. H D Phaneendra2  1Research scholar, National Institute of Engineering, Mysore,  2 Professor and Research Guide, National Institute of Engineering, Mysore Abstract Secured Communication involves Encryption process at the sending end and Decryption process at the receiving end of the communication system. Many Ciphers have been developed to provide data security . The efficiency of the Ciphers that are being used depends mainly on their throughput and memory requirement. Using of large key spaces with huge number of rounds with multiple complex operations may provide security but at the same time affects speed of operation. Hence in this paper we have proposed a method to improve Caesar cipher with random number generation technique for key generation operations. The Caesar cipher has been expanded so as to include alphabets, numbers and symbols. The original Caesa...
Image
#researchers #phd #articles #papersubmission #student #researchscholors #AIRCC #IJCIS #DataSystemIntegrity #Information_Hiding #Wireless_Network_Security Call for Article....! International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Paper Title: Rectified Differential Cryptanalysis of 16 Round Present Website URL: https://wireilla.com/ijcis/index.html Volume URL: https://airccse.org/journal/ijcis/current2012.html Paper URL: https://wireilla.com/papers/ijcis/V2N4/2412ijcis04.pdf Submission through Email: ijcisjournal@wireilla.com   Submission Link: http://coneco2009.com/submissions/imagination/home.html Here's where you can reach us: ijcisjournal@yahoo.com  
Image
International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: http://airccse.org/journal/ijcis/index.html Submission System: ijcisjournal@wireilla.com   or through  Submission System: http://allcfps.com/wireilla/submission/index.php Contact Us: ijcisjournal@yahoo.com Submission Deadline : June 11, 2022  
Image
 International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: http://airccse.org/journal/ijcis/index.html Most Viewed Article for an Year: https://www.academia.edu/39778547/CRYPTOLOGY_AND_INFORMATION_SECURITY_PAST_PRESENT_AND_FUTURE_ROLE_IN_SOCIETY Original Source URL: https://wireilla.com/papers/ijcis/V9N2/9219ijcis02.pdf Volume Link: https://airccse.org/journal/ijcis/current2019.html Submission System: http://allcfps.com/wireilla/submission/index.php Contact Us: ijcisjournal@yahoo.com
 DYNAMIC VALIDITY PERIOD CALCULATION OF DIGITAL CERTIFICATES BASED ON AGGREGATED SECURITY ASSESSMENT Alexander Beck, Jens Graupmann, Frank Ortmeier  Computer Systems in Engineering, Otto-von-Guericke-University, Magdeburg, Germany Abstract The paper proposes a method based on different security-related factors to dynamically calculate the validity period of digital certificates. Currently validity periods are most often defined statically without scientific justification. This approach is not sufficient to objectively consider the actual need for security. Therefore the approach proposed in this paper considers relevant security criteria in order to calculate a meaningful validity period for digital certificates. This kind of security assessment can be executed periodically in order to dynamically respond to changing conditions. Especially in the context of complex systems and infrastructures that have an increased need for security, privacy and availability this issue is high...