DSpace Repository

Browsing by Author "Farajallah, Mousa"

Browsing by Author "Farajallah, Mousa"

Sort by: Order: Results:

  • Abutaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan (International Journal of Computer Applications, 2011)
    It is well known that Hash algorithm works in one way, and it cannot be reversed. We can build a new algorithm by using Hill cipher technique .Since its invention in 1929, Hill cipher algorithm which is one of the most ...
  • Taradeh, Omar; Iqefan, Manar; Sharbati, Lana (جامعة بوليتكنك فلسطين - هندسة حاسوب, 2021-01-01)
    People who are unable to read texts, like people suffering from visual impairments, need to get new information from books and other written sources for educational purposes and entertainment. Although there are some ...
  • El Assad, Safwan; Farajallah, Mousa; Vladeanu, Calin (The 10th International Conference on Communications (COMM), 2014-05-29)
    A variety of chaos-based cryptosystems have been investigated during the last decade. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by ...
  • Farajallah, Mousa (UNIVERSITE DE NANTES, 2015-06-30)
    The security of image and video data is important for many applications which require in real-time a high security level. In the first part of this work, four chaos-based cryptosystems, flexible, efficient, and more robust ...
  • El Assad, Safwan; Abutaha, Mohammed; Farajallah, Mousa; Déforges, Olivier (2017)
     What is chaos? - How to generate it?chaos? How to generate it? - Chaos & Cryptography - Why using chaos to secure information? - Chaos--based cryptography *Design and realization of an efficient chaos--based stream cipher ...
  • Farajallah, Mousa (IEEE, 2017-03-07)
    What is What is chaos? - How to generate it?chaos? How to generate it? - Chaos & Cryptography - Why using chaos to secure information? - Chaos--based cryptography *Design and realization of an efficient chaos--based stream ...
  • Abutaha, Mohammed; El Assad, Safwan; Farajallah, Mousa; Queudet, Audrey; Deforge, Olivier (2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015-12-14)
    Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based ...
  • Abutaha, Mohammed; El Assad, Safwan; Farajallah, Mousa; Queudet, Audrey; Deforge, Olivier (IEEE, 2015)
    Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based ...
  • Farajallah, Mousa (IEEE, 2015-12-16)
  • Farajallah, Mousa; El Assad, Safwan; Déforges, Olivier (Multimedia Tools and Applications-Springer US, 2018-11-10)
    In the recent literature, many research studies have proven that Known and Chosen plaintext attacks are very efficient tools that are widely used to cryptanalyze partially or completely some chaos-based and non-chaos ...
  • Hamamreh, Rushdi; Farajallah, Mousa (International Journal of Computer Science and Network Security, 2009-05-29)
    Information security is an important issue. Hill Cipher is one of the most famous symmetric cryptosystem that can be used to protect information from unauthorized access.Hill cipher is a polygraph substitution cipher based ...
  • Farajallah, Mousa; El Assad, Safwan; Chetto, Maryline (2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, 2013-08-20)
    Wireless Sensor Networks (WSNs) are a growing field of research since they are used in many applications. Nevertheless, they are subject to many requirements such as real-time constraints, energy limitations, and security ...
  • Badran, Sultan; Arman, Nabil; Farajallah, Mousa (IEEE, 2021-07-14)
    This paper presents an implementation of a novel approach, utilizing hybrid data partitioning, to secure sensitive data and improve query performance. In this novel approach, vertical and horizontal data partitioning ...
  • Farajallah, Mousa; Fawaz, Zeinab; El Assad, Safwan; Deforges, Olivier (The 7th International Conference on Emerging Security Information, Systems and Technologies, 2013-08-25)
    Many image encryption algorithms based on chaos have been proposed since 1989. Most of them are slow and use a secret key of encryption/decryption independent of the plain image. We introduce a new fast and secure image ...
  • Farajallah, Mousa; Deforges, Olivier; El Assad, Safwan (International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2016-02-01)
    Nonlinear dynamic cryptosystems or chaos-based cryptosystems have been attracting a large amount of research since 1990. The critical aspect of cryptography is to face the growth of communication and to achieve the design ...
  • Chetto, Maryline; Noura, Hassan; El Assad, Safwan; Farajallah, Mousa (2012 International Conference for Internet Technology and Secured Transactions, 2012-12-20)
    Abstract: A growing number of systems are highly connected and distributed over the internet. These systems require innovative software services and infrastructures in order to guarantee security and reliability. This ...
  • Jawabreh, Lama; Zahdeh, Tasneem (جامعة بوليتكنك فلسطين - هندسة حاسوب, 2021-01-01)
    Wireless Multimedia Sensor Network (WMSN) is an environment for transferring images, audios, and videos. However, it has many restrictions and limitations that affect the security level as well as the required power ...
  • Hasanat, Fatima; Nofal, Ghada; Awad, Shorouq (جامعة بوليتكنك فلسطين - هندسة حاسوب, 2022-12-01)
    Water and land are both considered limited resources. A new farming technique was introduced to solve this issue which is Vertical Farming. This technique is one of the best solutions because it improves global food ...
  • Qumsieh, Rawan; Farajallah, Mousa; Hamamreh, Rushdi (Springer US, 2019-12-01)
    Image encryption is very different from that of texts due to the bulk data capacity and the high redundancy of images. Thus, traditional methods are difficult to use for image encryption as their pseudo-random sequences ...
  • Hraini, Iyad; Farajallah, Mousa; Arman, Nabil; Hamidouche, Wassim (IEEE Access, 2021-11-30)
    Wireless Multimedia Sensor Networks (WMSNs) have been widely used in many aspects of life such as monitoring aims, risk environments and medical services. However, WMSNs have many challenges due to resources limitation ...

Search DSpace

Browse

My Account