Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Split-n-Swap: A New Modification of the Twofish Block Cipher Algorithm

    Awny Sayed1,2, Maha Mahrous3, Enas Elgeldawi1,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1723-1734, 2023, DOI:10.32604/cmc.2023.032838

    Abstract Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern. A robust data security system should protect the information assets of any organization against cybercriminal activities. The Twofish algorithm is one of the well-known symmetric key block cipher cryptographic algorithms and has been known for its rapid convergence. But when it comes to security, it is not the preferred cryptographic algorithm to use compared to other algorithms that have shown better security. Many applications and social platforms have adopted other symmetric key block cipher cryptographic algorithms such as the Advanced Encryption Standard (AES) algorithm… More >

  • Open Access

    ARTICLE

    Enhancing Blockchain Security Using Ripple Consensus Algorithm

    A. Baseera1, Abeer Abdullah Alsadhan2,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4713-4726, 2022, DOI:10.32604/cmc.2022.029538

    Abstract In the development of technology in various fields like big data analysis, data mining, big data, cloud computing, and blockchain technology, security become more constrained. Blockchain is used in providing security by encrypting the sharing of information. Blockchain is applied in the peer-to-peer (P2P) network and it has a decentralized ledger. Providing security against unauthorized breaches in the distributed network is required. To detect unauthorized breaches, there are numerous techniques were developed and those techniques are inefficient and have poor data integrity. Hence, a novel technique needs to be implemented to tackle the new breaches in the distributed network. This… More >

Displaying 1-10 on page 1 of 2. Per Page