Skip to content
VuFind
Advanced
  • A novel secret key generation...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
Export Ready — 
A novel secret key generation based on image link
QR Code

A novel secret key generation based on image link

One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generate an identical...

Full description

Bibliographic Details
Main Authors: Sulaiman, Alyaa Ghanim, Taha Alshaikhli, Imad Fakhri, Wahiddin, Mohamed Ridza, Houri, S, Jamil, Norziana, Ismail, Ahmad Fadzil
Format: Article
Language:English
English
Published: Science Publishing Corporation Inc 2018
Subjects:
QA75 Electronic computers. Computer science
Online Access:http://irep.iium.edu.my/63930/
http://irep.iium.edu.my/63930/1/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link.pdf
http://irep.iium.edu.my/63930/2/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link_SCOPUS.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://irep.iium.edu.my/63930/
http://irep.iium.edu.my/63930/1/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link.pdf
http://irep.iium.edu.my/63930/2/63930_A%20novel%20secret%20key%20generation%20based%20on%20image%20link_SCOPUS.pdf

Similar Items

  • Comparative study on 4G/LTE cryptographic algorithms based on different factors
    by: Ghanim, Alyaa, et al.
    Published: (2014)
  • A protocol for secret key infusion from satellite transmissions
    by: Wahiddin, Mohamed Ridza, et al.
    Published: (2010)
  • Lightweight block cipher algorithms: review paper
    by: Salim, Sufyan, et al.
    Published: (2016)
  • MOIM: a novel design of cryptographic hash function
    by: Alahmad, Mohammad, et al.
    Published: (2013)
  • Analysis of confidentiality algorithms in different mobile generations
    by: Jassim, Khalid Fadhil, et al.
    Published: (2017)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips