Publication: An Alternative Method for Cryptology in Secret Communication
| dc.authorscopusid | 10639356300 | |
| dc.authorwosid | Köksal, Mehmet/Aag-3612-2021 | |
| dc.contributor.author | Koksal, Mehmet Emir | |
| dc.date.accessioned | 2025-12-11T00:39:02Z | |
| dc.date.issued | 2020 | |
| dc.department | Ondokuz Mayıs Üniversitesi | en_US |
| dc.department-temp | [Koksal, Mehmet Emir] Ondokuz Mayis Univ, Dept Math, TR-55139 Samsun, Turkey | en_US |
| dc.description.abstract | Commutativity of subsystems (SSs) in cascade connected forms to form larger systems gets worthy to improve noise disturbance, stability, robustness and many other properties in system design. There is a huge amount of work on the subject of commutativity of linear time-varying (LTV) systems and the mentioned improvements; these are referenced in the introduction. In this paper, another benefit of commutativity property is investigated in detail and illustrated by examples. This benefit is the gain of a new and original method for hiding the original (possibly secret) signals when sending them from one local area to another. Switching, pseudo-commutativity, and power-spectrum which are important for communication channels are extensively studied. It is shown that switching used for increasing safeness and slight deformations in commutativity conditions hardly spoil to attain the mentioned benefit. Hence, the paper presents an original and alternative method in cryptology. The results are all validated by illustrative examples and Matlab simulation toolbox Simulink. | en_US |
| dc.description.sponsorship | Scientific and Technological Research Council of Turkey (TUBITAK) [115E952] | en_US |
| dc.description.sponsorship | This study was supported by the Scientific and Technological Research Council of Turkey (TUBITAK) under the project No. 115E952. | en_US |
| dc.description.woscitationindex | Science Citation Index Expanded | |
| dc.identifier.doi | 10.6688/JISE.202009_36(5).0014 | |
| dc.identifier.endpage | 1152 | en_US |
| dc.identifier.issn | 1016-2364 | |
| dc.identifier.issue | 5 | en_US |
| dc.identifier.scopus | 2-s2.0-85091342121 | |
| dc.identifier.scopusquality | Q4 | |
| dc.identifier.startpage | 1141 | en_US |
| dc.identifier.uri | https://doi.org/10.6688/JISE.202009_36(5).0014 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.12712/38224 | |
| dc.identifier.volume | 36 | en_US |
| dc.identifier.wos | WOS:000565376700014 | |
| dc.identifier.wosquality | Q4 | |
| dc.institutionauthor | Koksal, Mehmet Emir | |
| dc.language.iso | en | en_US |
| dc.publisher | Inst Information Science | en_US |
| dc.relation.ispartof | Journal of Information Science and Engineering | en_US |
| dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | Commutativity | en_US |
| dc.subject | Cryptology | en_US |
| dc.subject | Communication | en_US |
| dc.subject | LTV System | en_US |
| dc.subject | Security | en_US |
| dc.title | An Alternative Method for Cryptology in Secret Communication | en_US |
| dc.type | Article | en_US |
| dspace.entity.type | Publication |
