.

Axes-Based Encryption Key

LAUR Repository

Show simple item record

dc.contributor.author Haidar, Imane
dc.contributor.author Haidar, Ali Massoud
dc.contributor.author Haraty, Ramzi A.
dc.date.accessioned 2019-03-18T11:41:45Z
dc.date.available 2019-03-18T11:41:45Z
dc.date.copyright 2018 en_US
dc.date.issued 2019-03-18
dc.identifier.isbn 9781538691205 en_US
dc.identifier.uri http://hdl.handle.net/10725/10228
dc.description.abstract Security has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. Nowadays, security has become an essential part in our daily life; from protecting mobile chats to bank accounts to confidential data. It is everywhere due to the huge amount of data stored and transmitted over public and unsecure networks. On the other hand, computers are advancing so fast that some cryptosystems may vanish in the upcoming years. For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. Several algorithms are applied to serve the goal, and promising results have been recuperated. Security has been maximized although there are limits concerning time and space. en_US
dc.description.sponsorship IEEE Computer Society en_US
dc.description.sponsorship Arab Computer Society en_US
dc.description.sponsorship Institute of Electrical and Electronic Engineers en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.subject Computer systems -- Congresses en_US
dc.subject Computer networks -- Congresses en_US
dc.subject Computer engineering -- Congresses en_US
dc.title Axes-Based Encryption Key en_US
dc.type Conference Paper / Proceeding en_US
dc.author.school SAS en_US
dc.author.idnumber 199729410 en_US
dc.author.department Computer Science And Mathematics en_US
dc.description.embargo N/A en_US
dc.publication.place Piscataway, N.J. en_US
dc.keywords Image color analysis en_US
dc.keywords Encryption en_US
dc.keywords Spirals en_US
dc.keywords Ciphers en_US
dc.keywords Computer security en_US
dc.description.bibliographiccitations Includes bibliographical references. en_US
dc.identifier.doi http://dx.doi.org/10.1109/AICCSA.2018.8612814 en_US
dc.identifier.ctation Haidar, I., Haidar, A. M., & Haraty, R. A. (2018, October). Axes-Based Encryption Key. In 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA) (pp. 1-8). IEEE. en_US
dc.author.email rharaty@lau.edu.lb en_US
dc.conference.date October 28th to November 1st, 2018 en_US
dc.conference.pages 1-8 en_US
dc.conference.place Aqaba, Jordan en_US
dc.conference.title 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url https://ieeexplore.ieee.org/abstract/document/8612814/keywords#keywords en_US
dc.orcid.id https://orcid.org/0000-0002-6978-3627 en_US
dc.publication.date 2018 en_US
dc.author.affiliation Lebanese American University en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account