Yahia Alemami
Universiti Sultan Zainal Abidin
Data securityEncryptionCryptographyMultiple encryptionLogistic mapEavesdroppingChaoticComputer networkComputer science
1Publications
1H-index
2Citations
Publications 1
Newest
#1Yahia Alemami (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 1
#2Mohamad Afendee Mohamed (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 6
Last. Mustafa Mamat (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 15
view all 4 authors...
There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twitter, Skype, etc), calling (mobile phone) and voice recording (record your voice and then send it to the other party), but there are ways to eavesdropping the calls and voice messages, One way to solve this problem is via cryptographic approach. Chaos cryptography build on top of nonlinear dynamics chaotic system has gained some footstep in data security. It provides an alternative to conventional...
2 CitationsSource