Page 103 - IJEEE-2023-Vol19-ISSUE-1
P. 103
Baban & Hameed | 99
[5] R. Amrutha, P. Perumal, S. Balaganesh, D. Ishwarya, [22] N. A. Azeez, and O.J. Chinazo, Achieving Data
"Secured Data Migration using AES Algorithm and Authentication With Hmac-Sha256 Algorithm", Computer
Authentication Techniques in Cloud Environment", Science & Telecommunications, Vol. 54, No. 2, 2018.
International Journal of Research in Engineering, Science and [23] B. Park, J. Song, and S. C. Seo, "Efficient Implementation
Management, Vol. 2, Issue 3, pp. 853-856, March-2019. of a Crypto Library Using Web Assembly", Electronics, Vol.
[6] I. Nti, E. Gymfi, and O. Nyarko, "Implementation of 9, No. 11, 2020.
advanced encryption standard algorithm with key length of 256 [24] Benmoussa, H., A. Abou El Kalam, and A.A. Ouahman.
bits for preventing data loss in an organization", Int. J. Adv. Towards a new intelligent generation of intrusion detection
Technol, Vol. 8, No. 02, pp. 1-5, 2017. system. in Proceedings of the 4th Edition of National Security
[7] S. Mondal, S. and S. Maitra, "Data security-modified AES Days (JNS4). 2014. IEEE.
algorithm and its applications", ACM SIGARCH Computer [25] M. Baykara, and R. Das, "A survey on potential
Architecture News, Vol. 42, No. 2, pp. 1-8, 2014. applications of honeypot technology in intrusion detection
[8] X. h.Wu, X. j. Ming, "Research of the Database Encryption systems", International Journal of Computer Networks and
Technique Based on Hybrid Cryptography" In 2010 Applications (IJCNA), Vo. 2, No. 5, pp. 203-211, 2015.
International Symposium on Computational Intelligence and [26] D. Mudzingwa, and R. Agrawal, "A study of methodologies
Design, 2010. used in intrusion detection and prevention systems (IDPS)", in
[9] M. C. Ah Kioon, Z. S. Wang, and S. Deb Das, "Security 2012 Proceedings of IEEE Southeastcon, 2012.
analysis of MD5 algorithm in password storage", In Applied [27] E. Cole, "Network security bible", John Wiley & Sons,
Mechanics and Materials. 2013. 2011.
[10] M. S. Hwang, and W. P. Yang, "A two-phase encryption [28] A. Valdes, and K. Skinner, “Probabilistic alert correlation,”
scheme for enhancing database security", Journal of Systems in International Workshop on Recent Advances in Intrusion
and Software, Vol. 31, No. 3, pp. 257-265, 1995. Detection. Springer, pp. 54–68, 2001.
[11] B. Schneier, et al., "The Twofish team’s final comments on [29] S. Li, Q. Zou, and W. Huang, "A new type of intrusion
AES Selection", AES round, Vol. 2, No. 1, pp. 1-13, 2000. prevention system", in 2014 international conference on
[12] W. M. Tatun, "The Advanced Encryption System (AES) information science, electronics and electrical engineering,
Development Effort: Overview and Update", SANS Institute, 2014.
2001. [30] I. Koniaris, et al., "Honeypots deployment for the analysis
[13] H. A. Younis, A. Y. Abdalla, and T. Y. Abdalla, "Partial and visualization of malware activity and malicious
encryption of compressed image using threshold quantization connections", in 2014 IEEE international conference on
and AES cipher", Iraq J. Electrical and Electronic Engineering, communications (ICC), 2014.
Vol. 8, No. 1, 2012. [31] J. Wang, and J. Zeng, "Construction of large-scale
[14] M. G. Singh, M. A. Singla, and M. K. Sandha, honeynet Based on Honeyd", Procedia Engineering, Vol. 15,
"Cryptography algorithm comparison for security pp. 3260-3264, 2011.
enhancement in wireless intrusion detection system", [32] Y. Gökirmak, et al, "IPv6 Balküpü Tasarimi", Tübitak
International Journal of Multidisciplinary Research, Vol.1, No. Ulakbim, Ankara, 2011.
4, pp. 143-151, 2011. [33] N. Shaji, and P. Bonifus, "Design of AES architecture with
[15] S. William, "Cryptography and Network Security: for area and speed tradeoff", Procedia Technology, Vol. 24, pp.
VTU", Pearson education india, 2006. 1135-1140, 2016.
[16] Z. J. Chowdhury, D. Pishva, and G. Nishantha, "AES and [34] B. Latinovic, Z. Ž. Avramovic, and M. Zajmovic, "Safety
Confidentiality from the Inside Out", in 2010 The 12th Analysis Of Reverse Algorithm Encryption In Databases",
International Conference on Advanced Communication Journal of Information Technology & Applications, Vol. 9, No.
Technology (ICACT), 2010. 1, 2019.
[17] K. F. Jasim, et al, "Analysis the Structures of Some
Symmetric Cipher Algorithms Suitable for the Security of IoT
Devices", Cihan University-Erbil Scientific Journal, Vol. 5,
No. 2, pp. 13-19, 2021.
[18] A. K. Mandal, C. Parakash, and A. Tiwari, "Performance
evaluation of cryptographic algorithms: DES and AES", in
2012 IEEE Students' Conference on Electrical, Electronics and
Computer Science, 2012.
[19] M. F. Mushtaq, et al, "A survey on the cryptographic
encryption algorithms", International Journal of Advanced
Computer Science and Applications, Vol. 8, No. 11, 2017.
[20] J. M. Turner, "The keyed-hash message authentication code
(hmac)", Federal Information Processing Standards
Publication, Vol. 198, No. 1, pp. 1-13, 2008.
[21] E. S. I. Harba, "Secure data encryption through a
combination of AES, RSA and HMAC", Engineering,
Technology & Applied Science Research, Vol. 7, No. 4, pp.
1781-1785, 2017.