© 2018 IEEE. The use of cryptography systems in cyber security domain has become a primary focus to maintain data confidentiality. Several cryptography solutions exist for protecting data against confidentiality attack. Due to the advancement of computing infrastructure, there is always a need for novel security solution to protect data and introduce more complexity to the intruder. In this paper, a novel graph-based crypto-system is proposed to provide data confidentiality during communication between users and devices. The proposed crypto-system uses a set of graphs of order n along with an operation defined over it to form a group algebraic structure. Using this group, plaintext, ciphertext, and secret key are represented as a graph. The...
Data is of all sorts, ranging from all pertaining entertainment to national defense. There is a high...
While the technical issues of securing unicast communications for client-server computing are fairly...
Encryption of a message has always been a concern as far as the communication area is concerned. The...
Data confidentiality and integrity are essential security goals in the data communication in the sma...
In today’s technological world, confidentiality is an important issue to deal with, and it is carrie...
Cryptography is a necessary tool for secrecy in our increasingly connected and data-driven world. As...
Along with the fast development of wireless technologies, smart devices have become an integral part...
Computer networks bring tremendous progress to the information-based society. Com- panies, organizat...
Abstract Assume that there are players and an eavesdropper Eve of unlimited computational power and ...
[[abstract]]A novel generalized group-oriented cryptosystem with an authenticated sender is proposed...
Abstract Assume that there are players and an eavesdropper Eve of unlimited computational power and ...
Many graph mining and analysis services have been de-ployed on the cloud, which can alleviate users ...
As the Internet evolves, we find more applications that involve data originating from multiple sourc...
As the Internet evolves, we find more applications that involve data originating from multiple sourc...
A cryptosystem describes the system where two or more individuals communicate in a secret manner ove...
Data is of all sorts, ranging from all pertaining entertainment to national defense. There is a high...
While the technical issues of securing unicast communications for client-server computing are fairly...
Encryption of a message has always been a concern as far as the communication area is concerned. The...
Data confidentiality and integrity are essential security goals in the data communication in the sma...
In today’s technological world, confidentiality is an important issue to deal with, and it is carrie...
Cryptography is a necessary tool for secrecy in our increasingly connected and data-driven world. As...
Along with the fast development of wireless technologies, smart devices have become an integral part...
Computer networks bring tremendous progress to the information-based society. Com- panies, organizat...
Abstract Assume that there are players and an eavesdropper Eve of unlimited computational power and ...
[[abstract]]A novel generalized group-oriented cryptosystem with an authenticated sender is proposed...
Abstract Assume that there are players and an eavesdropper Eve of unlimited computational power and ...
Many graph mining and analysis services have been de-ployed on the cloud, which can alleviate users ...
As the Internet evolves, we find more applications that involve data originating from multiple sourc...
As the Internet evolves, we find more applications that involve data originating from multiple sourc...
A cryptosystem describes the system where two or more individuals communicate in a secret manner ove...
Data is of all sorts, ranging from all pertaining entertainment to national defense. There is a high...
While the technical issues of securing unicast communications for client-server computing are fairly...
Encryption of a message has always been a concern as far as the communication area is concerned. The...