DSpace Repository

Browsing Scientific Published Papers by Author "Farajallah, Mousa"

Browsing Scientific Published Papers by Author "Farajallah, Mousa"

Sort by: Order: Results:

  • Abutaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan (International Journal of Computer Applications, 2011)
    It is well known that Hash algorithm works in one way, and it cannot be reversed. We can build a new algorithm by using Hill cipher technique .Since its invention in 1929, Hill cipher algorithm which is one of the most ...
  • El Assad, Safwan; Farajallah, Mousa; Vladeanu, Calin (The 10th International Conference on Communications (COMM), 2014-05-29)
    A variety of chaos-based cryptosystems have been investigated during the last decade. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by ...
  • Farajallah, Mousa (UNIVERSITE DE NANTES, 2015-06-30)
    The security of image and video data is important for many applications which require in real-time a high security level. In the first part of this work, four chaos-based cryptosystems, flexible, efficient, and more robust ...
  • El Assad, Safwan; Abutaha, Mohammed; Farajallah, Mousa; Déforges, Olivier (2017)
     What is chaos? - How to generate it?chaos? How to generate it? - Chaos & Cryptography - Why using chaos to secure information? - Chaos--based cryptography *Design and realization of an efficient chaos--based stream cipher ...
  • Farajallah, Mousa (IEEE, 2017-03-07)
    What is What is chaos? - How to generate it?chaos? How to generate it? - Chaos & Cryptography - Why using chaos to secure information? - Chaos--based cryptography *Design and realization of an efficient chaos--based stream ...
  • Abutaha, Mohammed; El Assad, Safwan; Farajallah, Mousa; Queudet, Audrey; Deforge, Olivier (2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015-12-14)
    Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based ...
  • Abutaha, Mohammed; El Assad, Safwan; Farajallah, Mousa; Queudet, Audrey; Deforge, Olivier (IEEE, 2015)
    Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based ...
  • Farajallah, Mousa (IEEE, 2015-12-16)
  • Farajallah, Mousa; El Assad, Safwan; Déforges, Olivier (Multimedia Tools and Applications-Springer US, 2018-11-10)
    In the recent literature, many research studies have proven that Known and Chosen plaintext attacks are very efficient tools that are widely used to cryptanalyze partially or completely some chaos-based and non-chaos ...
  • Hamamreh, Rushdi; Farajallah, Mousa (International Journal of Computer Science and Network Security, 2009-05-29)
    Information security is an important issue. Hill Cipher is one of the most famous symmetric cryptosystem that can be used to protect information from unauthorized access.Hill cipher is a polygraph substitution cipher based ...
  • Farajallah, Mousa; El Assad, Safwan; Chetto, Maryline (2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, 2013-08-20)
    Wireless Sensor Networks (WSNs) are a growing field of research since they are used in many applications. Nevertheless, they are subject to many requirements such as real-time constraints, energy limitations, and security ...
  • Badran, Sultan; Arman, Nabil; Farajallah, Mousa (IEEE, 2021-07-14)
    This paper presents an implementation of a novel approach, utilizing hybrid data partitioning, to secure sensitive data and improve query performance. In this novel approach, vertical and horizontal data partitioning ...
  • Farajallah, Mousa; Fawaz, Zeinab; El Assad, Safwan; Deforges, Olivier (The 7th International Conference on Emerging Security Information, Systems and Technologies, 2013-08-25)
    Many image encryption algorithms based on chaos have been proposed since 1989. Most of them are slow and use a secret key of encryption/decryption independent of the plain image. We introduce a new fast and secure image ...
  • Farajallah, Mousa; Deforges, Olivier; El Assad, Safwan (International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2016-02-01)
    Nonlinear dynamic cryptosystems or chaos-based cryptosystems have been attracting a large amount of research since 1990. The critical aspect of cryptography is to face the growth of communication and to achieve the design ...
  • Chetto, Maryline; Noura, Hassan; El Assad, Safwan; Farajallah, Mousa (2012 International Conference for Internet Technology and Secured Transactions, 2012-12-20)
    Abstract: A growing number of systems are highly connected and distributed over the internet. These systems require innovative software services and infrastructures in order to guarantee security and reliability. This ...
  • Qumsieh, Rawan; Farajallah, Mousa; Hamamreh, Rushdi (Springer US, 2019-12-01)
    Image encryption is very different from that of texts due to the bulk data capacity and the high redundancy of images. Thus, traditional methods are difficult to use for image encryption as their pseudo-random sequences ...
  • Hraini, Iyad; Farajallah, Mousa; Arman, Nabil; Hamidouche, Wassim (IEEE Access, 2021-11-30)
    Wireless Multimedia Sensor Networks (WMSNs) have been widely used in many aspects of life such as monitoring aims, risk environments and medical services. However, WMSNs have many challenges due to resources limitation ...
  • Chetto, Maryline; El Assad, Safwan; Farajallah, Mousa (International Journal of Internet Technology and Secured Transactions, 2014-01-01)
    A growing number of systems are highly connected and distributed over the internet. These systems require innovative software services and infrastructures in order to guarantee security and reliability. This issue has a ...
  • Fawaz, Zeinab; El Assad, Safwan; Farajallah, Mousa; Ayman, Khalil; Lozi, René; Déforges, Olivier (8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), 2013-12-09)
    In the last two decades, several chaos-based cryptosystems have been proposed. Some of them have architecture comprising a layer of permutation and a layer of diffusion and these layers are simultaneously executed in a ...
  • El Assad, Safwan; Farajallah, Mousa (Signal Processing: Image Communication-Elsevier, 2016-02-29)
    During the last decade, a variety of chaos-based cryptosystems has been introduced to protect the content of the transmitted images. In this paper, we propose a new fast, simple, and robust chaos-based cryptosystem ...

Search DSpace


Browse

My Account