Search

Journal Menu

Journal Browser

Special Issues

Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2026)
Guest Editors: Prof. Paul Andrew
Deadline: 31 December 2026

Special Issue on Artificial Intelligence for Energy Transition and Decarbonization (SI-AIETD26)
Guest Editors: Dr. Elkhatib Kamal, Dr. Reza Ghorbani, Dr. Ahmed Ragab, Prof. Mohamed Kouki
Deadline: 31 December 2026

Results (5)

Search Parameters:

Keyword: Encryption
Order results
Results per page
Open AccessArticle
8 Pages, 1,306 KB Download PDF
Device Authentication using Homomorphic Encryption

by Supriya Yadav and Gareth Howells
Journal of Engineering Research and Sciences, Volume 2, Issue 10, Page # 1-8, 2023; DOI: 10.55708/js0210001
Abstract: In the digital era, data security in files, databases, accounts, and networks is of utmost importance. Due to the sensitive, private, or protected information they contain, databases are a common target for cyber attacks. To assess threats to data and lower the risk involved with data processing and storage, data security is crucial. Therefore, it… Read More

(This article belongs to the Special Issue on Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2023) and the Section Software Engineering – Computer Science (SEC))

Open AccessArticle
6 Pages, 1,924 KB Download PDF
Histogram Based Visible Image Encryption for Real Time Applications

by Kiran, Sunil Kumar D S, Bharath K N, Harshitha Rohith, Sharath Kumar A J and Ganesh Kumar M T
Journal of Engineering Research and Sciences, Volume 1, Issue 7, Page # 1-6, 2022; DOI: 10.55708/js0107001
Abstract: Like most patient information, medical imaging data is subject to strict data protection and confidentiality requirements. This raises the issue of sending the data which contains a medical image on an open network as per the above issue, also there might be a leakage of information. Encrypting an Image and hiding the information in it… Read More

(This article belongs to the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
7 Pages, 468 KB Download PDF
Secure Anonymous Acknowledgments in a Delay-Tolerant Network

by Edoardo Biagioni
Journal of Engineering Research and Sciences, Volume 3, Issue 11, Page # 24-30, 2024; DOI: 10.55708/js0311002
Abstract: TCP and many other protocols use acknowledgments to provide reliable transmission of data over unreliable media. Secure acknowledgments offer a cryptographic guarantee that valid acknowledgments for a given message can only be issued by the intended receiver. In the context of an ad-hoc network, anonymous acknowledgments make it hard for an attacker to determine which… Read More

(This article belongs to the Special Issue on Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2024) and the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
7 Pages, 2,573 KB Download PDF
Applied Salt Technique to Secure Steganographic Algorithm

by Bo Bo Oo
Journal of Engineering Research and Sciences, Volume 2, Issue 2, Page # 8-14, 2023; DOI: 10.55708/js0202002
Abstract: Digital multimedia assets, including photographs, movies, and audio files, have become a staple of contemporary life. Steganography is a method for undetectable information concealment in these files. One can communicate messages to another by modifying multimedia signals so that a human would be unable to tell the difference between the original signal and the altered… Read More

(This article belongs to the Special Issue on Special Issue on Computing, Engineering and Sciences (SI-CES 2022-23) and the Section Information Systems – Computer Science (ISC))

Open AccessArticle
10 Pages Download PDF
Blockchain Based Framework for Securing Students’ Records

by Omega Sarjiyus and Israel Isaiah
Journal of Engineering Research and Sciences, Volume 1, Issue 6, Page # 45-54, 2022; DOI: 10.55708/js0106006
Abstract: Right now, colleges, as focuses of exploration and development, coordinate in their cycles different advances that permit further developing administrations and cycles for their individuals. Among the inventive innovations is the Web of Things that permits getting information from the climate and individuals through various gadgets. Security of information on college grounds is expected to… Read More

(This article belongs to the Section Cybernetics – Computer Science (CYC))

Share Link