A comparison of data encryption algorithms with the proposed algorithm: Wireless security | IEEE Conference Publication | IEEE Xplore