Suchergebnisse - "tiny encryption algorithm"
-
1
Autoren: et al.
Quelle: Neural Computing and Applications.
-
2
Autoren:
Quelle: 2024 3rd International Conference on Automation, Computing and Renewable Systems (ICACRS). :700-705
-
3
Autoren:
Quelle: Journal of Cyber Security and Mobility. :349-368
Schlagwörter: 03 medical and health sciences, 0302 clinical medicine
-
4
Autoren: Cici Rahmadani
Quelle: Bulletin of Data Science. 3:243-250
-
5
Autoren:
Quelle: Multimedia Tools and Applications. 84:12371-12394
-
6
Autoren:
Quelle: Jurnal Advanced Research Informatika. 1:1-11
-
7
Autoren:
Quelle: Journal of Student Research Exploration. 1:33-40
-
8
Autoren: et al.
Quelle: Healthcare Analytics, Vol 3, Iss , Pp 100177- (2023)
Schlagwörter: Internet of Medical Things, Quality of Service, Dynamic Step-wise Tiny Encryption Algorithm, Fruit Fly Optimization Algorithm, Energy Efficient Routing Protocol, Computer applications to medicine. Medical informatics, R858-859.7
Dateibeschreibung: electronic resource
-
9
Alternate Tiny Encryption Algorithm: A Modified Tiny Encryption Algorithm for Improved Data Security
Autoren:
Quelle: Engineering Cyber-Physical Systems and Critical Infrastructures ISBN: 9783031184963
-
10
Autoren: Muhammad Alfian
Quelle: Journal Basic Science and Technology. 10:93-98
-
11
Autoren: et al.
Quelle: 2021 3rd East Indonesia Conference on Computer and Information Technology (EIConCIT). :415-420
Schlagwörter: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
12
Autoren:
Quelle: Journal of Informatics and Computer Science (JINACS). 2:228-234
-
13
Autoren:
Quelle: Lecture Notes in Networks and Systems ISBN: 9789811992278
-
14
Autoren:
Quelle: KAKIFIKOM (Kumpulan Artikel Karya Ilmiah Fakultas Ilmu Komputer). :59-66
-
15
Autoren:
Quelle: Journal of Student Research Exploration; Vol. 1 No. 1: January 2023; 33 - 40 ; 2964-8246 ; 2964-1691 ; 10.52465/josre.v1i1
Schlagwörter: Text Messaging, TEA (Tiny Encryption Algorithm), Cryptool2
Relation: https://shmpublisher.com/index.php/josre/article/view/111/110; https://shmpublisher.com/index.php/josre/article/view/111
Verfügbarkeit: https://shmpublisher.com/index.php/josre/article/view/111
-
16
Autoren: et al.
Quelle: 2019 International Conference of Computer Science and Information Technology (ICoSNIKOM). :1-5
Schlagwörter: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
17
Autoren:
Quelle: 2019 International Conference on Information and Communications Technology (ICOIACT). :56-60
Schlagwörter: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Zugangs-URL: https://ieeexplore.ieee.org/document/8938456
-
18
Autoren:
Quelle: 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN). :795-799
Schlagwörter: 0211 other engineering and technologies, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Zugangs-URL: https://ieeexplore.ieee.org/document/8905270
-
19
Autoren:
Quelle: International Journal of Information Security and Privacy. 12:89-98
Schlagwörter: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Zugangs-URL: https://www.igi-global.com/ViewTitle.aspx?TitleId=190859&isxn=9781522543060
https://dblp.uni-trier.de/db/journals/ijisp/ijisp12.html#KaushalS18
https://doi.org/10.4018/IJISP.2018010108
https://ideas.repec.org/a/igg/jisp00/v12y2018i1p89-98.html
https://www.igi-global.com/article/breaching-security-of-full-round-tiny -encryption -algorithm /190859 -
20
Autoren: et al.
Quelle: Neural Computing & Applications; Dec2025, Vol. 37 Issue 34, p28529-28548, 20p
Schlagwörter: CRYPTOGRAPHY, BLOCK ciphers, DEEP learning, MACHINE learning, STATISTICAL accuracy
Full Text Finder
Nájsť tento článok vo Web of Science