• Publications
  • Influence
Multidimensional key RC6 algorithm
This paper modified the RC6 Algorithm using a multidimensional key size to increase its security using different sizes of the input key. Expand
Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal
In this paper, the application of the enhanced secure hash algorithm-512 is implemented on web applications specifically in password hashing. Expand
Modified El Gamal algorithm for multiple senders and single receiver encryption
This paper presents a modification of the ElGamal Encryption Algorithm which allows multiple senders to encrypt a plaintext message using multiple private keys intended for a single recipient for decryption. Expand
Implementation of Enhanced MD5 Algorithm using SSL to Ensure Data Integrity
This paper addressed a weak MAC construction inside SSL as it suffered to cipher suite rollback attack since it used vulnerable MD5 Algorithm [5] [6]. Expand
Classification of coffee bean species using image processing, artificial neural network and K nearest neighbors
The quality of coffee beans differs from each other based on the geographic locations of its sources. The coffee bean quality is conventionally determined by visual inspection, which is subjective,Expand
Analysis of Key Randomness in Improved One-Time Pad Cryptography
In cryptography, one-time pad (OTP) is claimed to be the perfect secrecy algorithm in several works if all of its features are applied correctly. Expand
Incorporation of graphene oxide into a chitosan–poly(acrylic acid) porous polymer nanocomposite for enhanced lead adsorption
The present study describes the successful incorporation of graphene oxide (GO) into a binary polymer composite blend of chitosan–poly(acrylic acid) (CS–PAA) to obtain porous hydrogel nanocompositeExpand
An image processing technique for coffee black beans identification
This study presents a method of controlling the coffee bean quality using Image Processing techniques. Expand
Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm
This paper introduces an innovative modification of the Blowfish algorithm designed to capitalize on its strengths but supports 128-bits block size text input using dynamic selection encryption method and reduction of cipher function execution through randomly determined rounds. Expand