Suchergebnisse - "Encryption/Decryption Algorithm"

Andere Suchmöglichkeiten:

  1. 1

    QR code-based ECG signal encryption/decryption algorithm von Mathivanan, P., Ganesh, A. Balaji, Venkatesan, R.

    ISSN: 0161-1194, 1558-1586
    Veröffentlicht: West Point Taylor & Francis 04.05.2019
    Veröffentlicht in Cryptologia (04.05.2019)
    “… The paper presents a novel and enhanced bio-signal (ECG) cryptographic technique in which a QR code has been successfully utilized as a data container. The …”
    Volltext
    Journal Article
  2. 2

    A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication von Noor, Noor Sattar, Hammood, Dalal Abdulmohsin, Al-Naji, Ali, Chahl, Javaan

    ISSN: 2073-431X, 2073-431X
    Veröffentlicht: Basel MDPI AG 01.03.2022
    Veröffentlicht in Computers (Basel) (01.03.2022)
    “… Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user …”
    Volltext
    Journal Article
  3. 3

    RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission von Guptha, M. N. Sharada, Eshwarappa, M. N.

    ISSN: 0929-6212, 1572-834X
    Veröffentlicht: New York Springer US 01.07.2022
    Veröffentlicht in Wireless personal communications (01.07.2022)
    “… Security is an essential task while focusing on confidential level of patient information during medical data transmission. The image encryption algorithms …”
    Volltext
    Journal Article
  4. 4
  5. 5

    Image based Steganography in Cryptography implementing different Encryption-Decryption Algorithm von Dutta, Pinky Saikia, Chakraborty, Sauvik

    ISSN: 2456-3307, 2456-3307
    Veröffentlicht: 20.07.2020
    “… Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which …”
    Volltext
    Journal Article
  6. 6

    10 Clock-Periods Pipelined Implementation of AES-128 Encryption-Decryption Algorithm up to 28 Gbit/s Real Throughput by Xilinx Zynq UltraScale+ MPSoC ZCU102 Platform von Visconti, Paolo, Capoccia, Stefano, Venere, Eugenio, Velázquez, Ramiro, Fazio, Roberto de

    ISSN: 2079-9292, 2079-9292
    Veröffentlicht: Basel MDPI AG 01.10.2020
    Veröffentlicht in Electronics (Basel) (01.10.2020)
    “… The security of communication and computer systems is an increasingly important issue, nowadays pervading all areas of human activity (e.g., credit cards, …”
    Volltext
    Journal Article
  7. 7

    Real-Time Encryption/Decryption Algorithm with A Fractional Chaotic System of Various Data: Image, Speech, and Text von Ataş, Muhammet Taha, Güler, Hasan

    ISSN: 2349-5103, 2199-5796
    Veröffentlicht: New Delhi Springer India 01.08.2022
    “… Nowadays, a fractional-order chaotic system is commonly used in digital cryptosystem applications due to its precision to initial conditions and their …”
    Volltext
    Journal Article
  8. 8

    A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography von Rathore, Manjari Singh, Poongodi, M., Saurabh, Praneet, Lilhore, Umesh Kumar, Bourouis, Sami, Alhakami, Wajdi, Osamor, Jude, Hamdi, Mounir

    ISSN: 0045-7906, 1879-0755
    Veröffentlicht: Elsevier Ltd 01.09.2022
    Veröffentlicht in Computers & electrical engineering (01.09.2022)
    “… •This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method …”
    Volltext
    Journal Article
  9. 9

    Event-based privacy-consensus control for multiagent systems: An enhanced framework for fault-tolerance and protection against eavesdropping von Hu, Xiaoyan, Ye, Dan

    ISSN: 0096-3003
    Veröffentlicht: Elsevier Inc 01.09.2025
    Veröffentlicht in Applied mathematics and computation (01.09.2025)
    “… This paper investigates the consensus problem of privacy protection for multi-agent systems (MASs) under conditions of compound faults. We develop a …”
    Volltext
    Journal Article
  10. 10

    VLSI Implementation of RSA Encryption/Decryption Algorithm von R, Rasu, ., Manoshrudhy, Shanmugasundaram, P.

    ISSN: 2347-2227, 2347-6141
    Veröffentlicht: Nagercoil iManager Publications 15.05.2014
    Veröffentlicht in I-Manager's Journal on Computer Science (15.05.2014)
    “… The RSA system is widely employed in networking applications for good performance and high security. It supports the multiple key sizes like 128 bits, 256 …”
    Volltext
    Journal Article
  11. 11

    Algebraic Coding Theory Using Pell Equation x2 − 8y2 = 1 von Janaki, G, Gowri, Shankari A

    ISSN: 1592-7415, 2282-8214
    Veröffentlicht: Pescara Accademia Piceno Aprutina dei Velati in Teramo (APAV) 01.03.2023
    Veröffentlicht in Ratio mathematica (01.03.2023)
    “… An interdisciplinary field with significant practical use is cryptography. The difficulty of specific mathematical computing tasks affects a public key …”
    Volltext
    Journal Article
  12. 12

    Design of Event-Triggered Secure Containment Controllers for Multi-Agent Systems over Signed Graphs von Zheng, Shaobo, Zhou, Lei

    ISSN: 0278-081X, 1531-5878
    Veröffentlicht: New York Springer US 01.06.2025
    Veröffentlicht in Circuits, systems, and signal processing (01.06.2025)
    “… On one hand, an encryption-decryption algorithm is proposed to improve data security and reliability …”
    Volltext
    Journal Article
  13. 13

    Encryption-Decryption-Based Bipartite Synchronization of Markov Jump Coupled Neural Networks: An Event-Triggered Mechanism von Shi, Liangyao, Wang, Jing, Yan, Huaicheng, Cao, Jinde, Shen, Hao

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: IEEE 2025
    Veröffentlicht in IEEE internet of things journal (2025)
    “… Moreover, an encryption-decryption algorithm that takes into account identity authentication is programmed to encrypt the data at the triggering moment of each node …”
    Volltext
    Journal Article
  14. 14

    Word-based encryption algorithm using dictionary indexing with variable encryption key length von Al-Jarrah, Ahmad, Albsharat, Amer, Al-Jarrah, Mohammad

    ISSN: 2088-8708, 2722-2578, 2088-8708
    Veröffentlicht: Yogyakarta IAES Institute of Advanced Engineering and Science 01.02.2022
    “… This paper proposes a new algorithm for text encryption utilizing English words as a unit of encoding. The algorithm vanishes any feature that could be used to …”
    Volltext
    Journal Article
  15. 15

    An Efficient ASIC Implementation of CLEFIA Encryption/Decryption Algorithm With Novel S-Box Architectures von Saravanan, P., Rani, S. Subha, Rekha, S. Shanthi, Jatana, H.S.

    Veröffentlicht: IEEE 01.07.2019
    “… The demand for lightweight cryptography is inevitable considering the need for security and privacy in the resource constrained environment like active smart …”
    Volltext
    Tagungsbericht
  16. 16

    Self-Synchronizing Mode of Operation for an Encryption/Decryption Algorithm

    Veröffentlicht: Washington, D.C Targeted News Service 09.01.2024
    Veröffentlicht in Targeted News Service (09.01.2024)
    Volltext
    Newsletter
  17. 17

    A MESSAGE CRYPTOGRAPHY TECHNIQUE USING DNA BASED HYBRID APPROACH von Godbole, Vaibhav

    ISSN: 1985-6571
    Veröffentlicht: Kajang Science & Technology Research Institute for Defence (STRIDE) 01.01.2019
    Veröffentlicht in Defence S&T Technical Bulletin (01.01.2019)
    “… Cryptography makes the transmitted message unreadable to unauthorised users. DNA cryptography is being explored worldwide and even in being in its primitive …”
    Volltext
    Journal Article
  18. 18
  19. 19
  20. 20

    A Coding Algorithm using Super-edge Magic Total Labeling of Extended Duplicate Graphs von Jegan, R., Vijayakumar, P., Thirusangu, K.

    Veröffentlicht: IEEE 08.09.2022
    “… Graph labeling has wide applications in the field of radio astronomy, computer networks, communication networks and cryptography etc. Encoding is a technique …”
    Volltext
    Tagungsbericht