ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: transmission
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
Josepha Menandas,Mary Subaja
#Elliptic curve cryptography
#transport layer security
#confidentiality
#authentication
#integrity
#chinese remainder theorem
#hash algorithm
#point arithmetic
Enhancing IoV Integration: The Critical Role of Secure Data Transmission in IoT and Electric Vehicle Ecosystems
Faisal Faisal,Moamin Mahmoud,Abba Hassan,Salama Mostafa,Saraswathy Gunasekaran
#Internet of things
#electric vehicles
#internet of vehicles
#security
#data protection
#blockchain
#smart grid
Federated Graph Neural Networks for Dynamic IoT Collaboration Optimization in Smart Home Environments
Cheng Zhang,Yuanquan Zhong
#IoT device collaboration
#graph neural network
#federated learning
#graph structure
#smart home
A Hybrid Image Compression Scheme using DCT and Fractal Image Compression
Chandan Singh Rawat,Sukadev Meher
#Image compression
#DCT
#fractal image compression
#quantization
#zig%zag scanning
#huffman coding
An Enhanced Q-Learning MAC Protocol for Energy Efficiency and Convergence in Underwater Sensor Networks
Islam Ud Din,Irshad Abbasi,Sikandar Ali,Khalil Al Ruqeishi
#Q-Learning
#under water sensor networks
#MAC protocol
#adaptive Q-Learning
#energy efficiency
A Flexible Algorithm Design of Spatial Scalability for Real-time Surveillance Applications
Zhe Zheng,Jinghua Liu,Darui Sun,Jinghui Lu,Song Qiu,Yanwei Xiong,Rui Liu,Wenpeng Cu
#Video compression
#video transmission
#scalable coding
#inter-layer reference
#image rescaling
#reference picture management
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
Integrated Shared Random Key Agreement Protocol for Wireless Sensor Network
Anusha Thanganadar,Venkatesan Raman
#Energy
#entropy
#galois ring
#sensor nodes
#shared random key
#physically unclonable function
A New Way of Accelerating Web by Compressing Data with Back Reference-Prefer Geflochtener
Kushwaha Singh,Challa Krishna,and Saini Kumar
#Backward references
#shortest path technique
#HTTP
#iterative compression
#web
#LZSS and LZ77
Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things
Anitha Dharmalingaswamy,Latha Pitchai
#Neighbor index
#objective function
#reliability
#residual energy
#RSSI
Blockchain-based Scalable and Secure EHR Data Sharing using Proxy Re-Encryption
Naresh Sammeta,Latha Parthiban
#EHR
#blockchain
#chaos theory
#re-encryption
#cloud
Multi-Level Attack with Dynamic S-Box Variable Key Pattern Generation for Key Cohort Using AES
Anusha Padmavathi Rajendran,Dhanalakshmi Krishnan Sadhasivam
#Advanced encryption standard
#S box
#variable key generation
#encryption
#decryption
Tree-based Multicast Routing and Channel Assignment for Enhanced Throughout in Emerging Cognitive Radio Networks
Haythem Bany Salameh,Mustafa Ali
#Cognitive radio
#multicast routing
#minimum spanning tree
#shortest path tree
#licensed spectrum
Sri Venkateswara College of Engineering, India
#Image encryption
# modular addition
# chaotic maps
# l ogistic map
# socek
# grp
# cross
# block cipher
Secure Verification Technique for Defending IP
#
Curve Cryptography and its Variants
#
Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol
Department of Electronics Engineering, Anna Univers ity, India. 2Department of Information Technology, Thiagarajar C ollege of Engineering, India.
# Hybrid MANET
# mobile agents
# AODV ALMA
# adaptive g ateway discovery
Department of Electronics and Communication Engine ering, PSG College of Technology, India.
# wavelet
#multiwavelet
#SPIHT
#SPECK
1
2
3
»
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint