• Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Communications
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Letter to the Editor
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • critical-appraisal
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • in-memomoriam
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • non-scientific
  • Obituary
  • original-paper
  • original-report
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • review-paper
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • serologic-method-review
  • short-communication
  • short-report
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • In Jour Smart Sensing And Intelligent Systems
  • International Journal Advanced Network Monitoring Controls


Article | 01-September-2015


Recent trends in wireless sensor networks leads to the development of new protocols for data gathering. In this paper, a secure energy efficient location aware data gathering approach is introduced to secure data gathering. An Elliptic Curve Diffie Hellman Key Exchange (ECDHKE) algorithm is utilized for key generation and key exchange between the sensor nodes to maintain security and prevent the data from malicious nodes. The performance of the proposed scheme is validated in terms of packet

M. Roseline Juliana, S. Srinivasan

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 3, 1748–1767

Research Article | 28-March-2018

New Compression–Encryption Algorithm Using Chaos-Based Dynamic Session Key

This research proposes New Compression–Encryption Algorithm Using Chaos-Based Dynamic Session Key (CEA-CBDSK) to encrypt image data. CEA-CBDSK consists of an algorithm to generate initial symmetric keys and an algorithm to encrypt image data using four dynamic session keys derived from the initial keys. The key generation uses Discrete Wavelet Transform, Arnold Cat Map, and Cipher Block Chaining, while the image encryption is performed using the session keys produced by the chaotic

Emy Setyaningsih, Retantyo Wardoyo, Anny Kartika Sari

International Journal on Smart Sensing and Intelligent Systems, Volume 11 , ISSUE 1, 1–19

Article | 30-November-2018

A Secure Voice Signature Based Lightweight Authentication Approach for Remote Access Control

I. INTRODUCTION The adoption of cryptography in security system has not only enhanced the integrity of data and confidentiality but obviously contribute to the acceptability of most of the new technologies. However, cryptography based security schemes may not proffer universal security solution to most systems or networks. This is due to the restrictive processing power and memory resources, wider key generation procedure and operability that characterised these class of cryptograph based

Oladayo Olufemi Olakanmi, Aminat Shodipo

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 2, 69–74

No Record Found..
Page Actions