  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Intelligent Systems and Internet of Things</full_title>
  <abbrev_title>JISIoT</abbrev_title>
  <issn media_type="print">2690-6791</issn>
  <issn media_type="electronic">2769-786X</issn>
  <doi_data>
   <doi>10.54216/JISIoT</doi>
   <resource>https://www.americaspg.com/journals/show/2278</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Security and Privacy Protection for Online Electronic Documents Based on Novel Encryption Techniques</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">College of Computer and Information Technology, American University in the Emirates, Dubai, United Arab Emirates,</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Ravi</given_name>
    <surname>Ravi</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Symbiosis Institute of Technology (SIT) Pune Campus, Symbiosis International (Deemed University) (SIU), Pune, 412115, Maharashtra, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ravi</given_name>
    <surname>Sekhar</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Medical Instrumentation Technical Engineering, Medical Technical College, Al-Farahidi University, Baghdad, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Jamal Fadhil</given_name>
    <surname>Tawfeq</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Medical Instrumentation, Technical College of Engineering, Al-Bayan University, Baghdad, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Sinan Q.</given_name>
    <surname>Salih</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Symbiosis Institute of Technology (SIT) Pune Campus, Symbiosis International (Deemed University) (SIU), Pune, 412115, Maharashtra, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Pritesh</given_name>
    <surname>Shah</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">College of Pharmacy, University of Al-Ameed, Karbala PO Box 198, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ahmed Dheyaa</given_name>
    <surname>Radhi</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>Corporate strategies have employed techniques that enter the domain of shadow and espionage in this rapidly developing, technologically competitive business environment. Supporting a security strategy is a way to counter these possible dangers. To preserve corporate success in the marketplace, network security needs to be crucial to the protection of electronic documents. Encryption technology has become more important in recent years for protecting online digital documents. This research was motivated by the fact that document verification has become quite time-consuming and difficult due to a variety of challenging and laborious processes. Existing technologies often malfunction when a single kind of encryption, such as AES, Data Encryption Standard (DES), or Rivest, Shamir, Adleman (RSA), is utilized at the request of the customer. Therefore, this study proposes hybrid cryptography, which integrates two novel algorithms into existing encryption protocols. A digital signature is generated for the data when a user uploads a data. The data are encrypted in parallel using the suggested Secured Hash Function-256 (SHA-256) method with improved DES and RSA (SHA-256+Enhanced DES+RSA). The proposed encryption method was shown to be more accurate than previous studies in experimental evaluations of  data encryption.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2024</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2024</year>
  </publication_date>
  <pages>
   <first_page>21</first_page>
   <last_page>28</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JISIoT.110103</doi>
   <resource>https://www.americaspg.com/articleinfo/18/show/2278</resource>
  </doi_data>
 </journal_article>
</journal>
