RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • SCOPUSKCI등재

        Counter Chain: A New Block Cipher Mode of Operation

        El-Semary, Aly Mohamed,Azim, Mohamed Mostafa A. Korea Information Processing Society 2015 Journal of information processing systems Vol.11 No.2

        In this paper, we propose a novel block cipher mode of operation, which is known as the counter chain (CC) mode. The proposed CC mode integrates the cipher block chaining (CBC) block cipher mode of operation with the counter (CTR) mode in a consistent fashion. In the CC mode, the confidentiality and authenticity of data are assured by the CBC mode, while speed is achieved through the CTR mode. The proposed mode of operation overcomes the parallelization deficiency of the CBC mode and the chaining dependency of the counter mode. Experimental results indicate that the proposed CC mode achieves the encryption speed of the CTR mode, which is exceptionally faster than the encryption speed of the CBC mode. Moreover, our proposed CC mode provides better security over the CBC mode. In summary, the proposed CC block cipher mode of operation takes the advantages of both the Counter mode and the CBC mode, while avoiding their shortcomings.

      • SCOPUSKCI등재

        Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques

        El-Semary, Aly M.,Mostafa, Mostafa Gadal-Haqq M. Korea Information Processing Society 2010 Journal of information processing systems Vol.6 No.4

        The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified based on detection approachs as being signature-based or anomaly-based. Even though intrusion detection systems are well defined, their cooperation with each other to detect attacks needs to be addressed. Consequently, a new architecture that allows them to cooperate in detecting attacks is proposed. The architecture uses Software Agents to provide scalability and distributability. It works in two modes: learning and detection. During learning mode, it generates a profile for each individual system using a fuzzy data mining algorithm. During detection mode, each system uses the FuzzyJess to match network traffic against its profile. The architecture was tested against a standard data set produced by MIT's Lincoln Laboratory and the primary results show its efficiency and capability to detect attacks. Finally, two new methods, the memory-window and memoryless-window, were developed for extracting useful parameters from raw packets. The parameters are used as detection metrics.

      • KCI등재

        SPCBC: A Secure Parallel Cipher Block Chaining Mode of Operation based on logistic Chaotic Map

        ( Aly M. El-semary ),( Mohamed Mostafa A. Azim ),( Hossam Diab ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.7

        Several block cipher modes of operation have been proposed in the literature to protect sensitive information. However, different security analysis models have been presented for attacking them. The analysis indicated that most of the current modes of operation are vulnerable to several attacks such as known plaintext and chosen plaintext/cipher-text attacks. Therefore, this paper proposes a secure block cipher mode of operation to thwart such attacks. In general, the proposed mode combines one-time chain keys with each plaintext before its encryption. The challenge of the proposed mode is the generation of the chain keys. The proposed mode employs the logistic map together with a nonce to dynamically generate a unique set of chain keys for every plaintext. Utilizing the logistic map assures the dynamic behavior while employing the nonce guarantees the uniqueness of the chain keys even if the same message is encrypted again. In this way, the proposed mode called SPCBC can resist the most powerful attacks including the known plaintext and chosen plaintext/cipher-text attacks. In addition, the SPCBC mode improves encryption time performance through supporting parallelized implementation. Finally, the security analysis and experimental results demonstrate that the proposed mode is robust compared to the current modes of operation.

      • KCI등재

        Counter Chain: A New Block Cipher Mode of Operation

        ( Aly Mohamed El Semary ),( Mohamed Mostafa A. Azim ) 한국정보처리학회 2015 Journal of information processing systems Vol.11 No.2

        In this paper, we propose a novel block cipher mode of operation, which is known as the counter chain (CC) mode. The proposed CC mode integrates the cipher block chaining (CBC) block cipher mode of operation with the counter (CTR) mode in a consistent fashion. In the CC mode, the confidentiality and authenticity of data are assured by the CBC mode, while speed is achieved through the CTR mode. The proposed mode of operation overcomes the parallelization deficiency of the CBC mode and the chaining dependency of the counter mode. Experimental results indicate that the proposed CC mode achieves the encryption speed of the CTR mode, which is exceptionally faster than the encryption speed of the CBC mode. Moreover, our proposed CC mode provides better security over the CBC mode. In summary, the proposed CC block cipher mode of operation takes the advantages of both the Counter mode and the CBC mode, while avoiding their shortcomings.

      • KCI등재

        Semi-automatic general approach to achieve the practical number of clusters for classification of remote sensing MS satellite images

        A. Serwa,Hossam H. El-Semary 대한공간정보학회 2020 Spatial Information Research Vol.28 No.2

        The main objective of this research is to find a semi-automatic method to determine the practical number of clusters in MS satellite images. This study puts a general skeleton for determining the practical number of classes in multi spectral (MS) remote sensing images. The sequence of the research starts with input the reference data, proposed classes’ samples and the MS image of the study area. The unsupervised classification is carried out using Envi software many times with different excessive number of classes. Fuzzy K-means method is applied as an unsupervised classification algorithm. A comparison between the classified image and the proposed classes’ samples is carried out using ADIPRS software to testify if the classifi- cation is reliable or not based on appearance. The process continues until the condition of the appearance is satisfied then the comparison with the reference is carried out to test the accuracy limit of the classes.

      • KCI등재

        Integration of soft computational simulator and strapdown inertial navigation system for aerial surveying project planning

        Ahmed. Serwa,Hossam H. El-Semary 대한공간정보학회 2016 Spatial Information Research Vol.24 No.3

        Aerial photogrammetry is an engineering sur- veying operation, which is a traditional methodology that can be used to map the earth. The rapid development in instrumentation and computer dependency led to the need to develop photogrammetric software. Inertial navigation system (INS) can provide light weight positioning methodology in aerial imagery. This research is a trial to integrate INS with a pre-developed soft computational simulator of 3A3P in order to obtain a dynamic virtual map. The developed system supports inertial measurement unit (IMU) and link the theoretical exposure station coor- dinates and the inertial measurements. The developed system enables photogrammetrists to visualize the aerial imaging process and it can be used to monitor the imaging process. It makes all the calculations that are required to obtain the theoretical coordinates and produces a virtual aerial map. The system converts the measurements of the IMU into space coordinates that can be useful to monitor the imaging process.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼