Výsledky vyhľadávania - "Encryption algorithms"
-
1
Multi-criteria usability evaluation of symmetric data encryption algorithms in fuzzy environment
ISSN: 2523-3963, 2523-3971Vydavateľské údaje: Cham Springer International Publishing 01.08.2020Vydané v SN applied sciences (01.08.2020)“… These parameters directly influence the selection strategy in decision-making problems. While using encryption algorithms, it may be a problem to choose which algorithm to use…”
Získať plný text
Journal Article -
2
STUDY OF HIGH-SPEED REALIZATION TECHNICS FOR ELEMENTS OF SYMMETRIC ENCRYPTION ALGORITHMS DURING CALCULATIONS ON GRAPHICS PROCESSOR
ISSN: 2226-1494, 2500-0373Vydavateľské údaje: Saint Petersburg St. Petersburg National Research University of Information Technologies, Mechanics and Optics 01.07.2018Vydané v Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki (01.07.2018)“…Subject of Research. The paper deals with the research of transformations used in up-to-date symmetric algorithms aimed at definition of the most high-speed ways of their realization on the graphics processor…”
Získať plný text
Journal Article -
3
Study of high-speed realization technics for elements of symmetric encryption algorithms during calculations on graphics processor
ISSN: 2226-1494, 2500-0373Vydavateľské údaje: ITMO University 01.07.2018Vydané v Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki (01.07.2018)“…Subject of Research. The paper deals with the research of transformations used in up-to-date symmetric algorithms aimed at definition of the most high-speed ways of their realization on the graphics processor…”
Získať plný text
Journal Article -
4
Enhanced Asymmetric Data Encryption Algorithms Using Residue Number System and Steganography
ISBN: 9798368457758Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2022“…The extent of the diffusion of digital communication necessitates a great amount of security. Data security plays a vital role in our businesses and daily…”
Získať plný text
Dissertation -
5
NEW APPROACH TO BOOK CIPHER: WEB PAGES AS A CRYPTOGRAPHIC KEY
ISSN: 2522-9052Vydavateľské údaje: National Technical University "Kharkiv Polytechnic Institute" 13.03.2023Vydané v Сучасні інформаційні системи (13.03.2023)“… The subject and purpose of the research are to develop an encryption method, which is based on the ideology of book cipher and uses web pages as a cryptographic key, in the organization of a secure…”
Získať plný text
Journal Article -
6
HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS
ISSN: 2522-9818, 2524-2296Vydavateľské údaje: Kharkiv National University of Radio Electronics 10.12.2021Vydané v Sučasnij stan naukovih doslìdženʹ ta tehnologìj v promislovostì (Online) (10.12.2021)“…Subject of research: procedures of asymmetric authentication of Internet of Things nodes to ensure the highest level of security using cryptographic chips…”
Získať plný text
Journal Article -
7
Challenges in 802.11 encryption algorithms: The need for an adaptive scheme for improved performance
ISBN: 1424445698, 9781424445691ISSN: 1089-7801Vydavateľské údaje: IEEE 01.11.2009Vydané v 2009 First Asian Himalayas International Conference on Internet (01.11.2009)“… Encrypting the data being transmitted is one of the approaches to address such risks. However, encryption algorithms are known to be computationally intensive…”
Získať plný text
Konferenčný príspevok.. -
8
Evaluation of symmetric encryption algorithms for MANETs
ISBN: 1424459656, 9781424459650Vydavateľské údaje: IEEE 01.12.2010Vydané v 2010 IEEE International Conference on Computational Intelligence and Computing Research (01.12.2010)“… A wireless device, usually with very limited resources, especially battery power, is subject to the problem of energy consumption due to encryption algorithms…”
Získať plný text
Konferenčný príspevok.. -
9
The Subject Of The First Part Is The Programming Services Associated With The Strengthening Of Encryption Algorithms, The Subject Of The 2nd Part Are The Services Of Audiowatermark, The Subject Of The 3rd Part Is Simon - Analysis, Project Management, Comp [Tender documents : T485538251]
ISSN: 2219-0112Vydavateľské údaje: Camden Disco Digital Media, Inc 09.03.2023Vydané v MENA Report (09.03.2023)Získať plný text
Newsletter -
10
Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set
ISSN: 2214-2126Vydavateľské údaje: Elsevier Ltd 01.02.2020Vydané v Journal of information security and applications (01.02.2020)“…The third party misuse and manipulation of digital images is a threat to security and privacy of human subjects…”
Získať plný text
Journal Article -
11
Hardware Optimization and System Design of Elliptic Curve Encryption Algorithm Based on FPGA
ISSN: 1687-725X, 1687-7268Vydavateľské údaje: New York Hindawi 11.10.2022Vydané v Journal of sensors (11.10.2022)“…Since entering the era of big data, the degree of information sharing is getting higher and higher; the information exchange is becoming more and more…”
Získať plný text
Journal Article -
12
Image Encryption Algorithm Based on Plane-Level Image Filtering and Discrete Logarithmic Transform
ISSN: 2227-7390, 2227-7390Vydavateľské údaje: Basel MDPI AG 01.08.2022Vydané v Mathematics (Basel) (01.08.2022)“…Image encryption is an effective way to protect image data. However, existing image encryption algorithms are still unable to strike a good balance between security and efficiency…”
Získať plný text
Journal Article -
13
Medical image encryption algorithm based on a new five-dimensional multi-band multi-wing chaotic system and QR decomposition
ISSN: 2045-2322, 2045-2322Vydavateľské údaje: London Nature Publishing Group UK 03.01.2024Vydané v Scientific reports (03.01.2024)“…In this study, we propose a medical image encryption algorithm based on a new five-dimensional (5D…”
Získať plný text
Journal Article -
14
Image encryption algorithm based on genetic operations and chaotic DNA encoding
ISSN: 1432-7643, 1433-7479Vydavateľské údaje: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2022Vydané v Soft computing (Berlin, Germany) (01.06.2022)“…Based on the two-dimensional logistic map and two genetic operations, a new image encryption algorithm is suggested…”
Získať plný text
Journal Article -
15
A visually meaningful secure image encryption algorithm based on conservative hyperchaotic system and optimized compressed sensing
ISSN: 0942-4962, 1432-1882Vydavateľské údaje: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2024Vydané v Multimedia systems (01.06.2024)“… the original image, this paper proposes a new visually image encryption algorithm, which can embed the compressed and encrypted image into a carrier image to achieve visual security, thus avoiding destruction and attacks…”
Získať plný text
Journal Article -
16
A DICOM ENCRYPTION ALGORITHM TO INCREASE SECURITY AND PRIVACY IN HEALTH DATA MANAGEMENT BASED ON PATIENT BIOMETRICS DATA, ARTIFICIAL INTELLIGENCE, AND RNA ENCRYPTION ALGORITHM
ISSN: 2306-6172, 2308-9822Vydavateľské údaje: 01.01.2025Vydané v Eurasian Journal of Mathematical and Computer Applications (01.01.2025)“… One such technology is encryption, which protects medical images. This paper proposes an efficient hybrid encryption algorithm to secure digital imaging and communications (DICOM) in healthcare…”
Získať plný text
Journal Article -
17
Highly secured and quickest image encryption algorithm based on trigonometric chaotic map and S-box
ISSN: 1432-7643, 1433-7479Vydavateľské údaje: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2023Vydané v Soft computing (Berlin, Germany) (01.08.2023)“… Motivated by this, we propose another proficient and quick image encryption plan subject to the trigonometric turbulent guide…”
Získať plný text
Journal Article -
18
The Improved Hill Encryption Algorithm towards the Unmanned Surface Vessel Video Monitoring System Based on Internet of Things Technology
ISSN: 1530-8669, 1530-8677Vydavateľské údaje: Cairo, Egypt Hindawi Publishing Corporation 01.01.2018Vydané v Wireless communications and mobile computing (01.01.2018)“…Depending on the actual demand of maritime security, this paper analyzes the specific requirements of video encryption algorithm for maritime monitoring system…”
Získať plný text
Journal Article -
19
A flexible image encryption algorithm based on 3D CTBCS and DNA computing
ISSN: 1380-7501, 1573-7721Vydavateľské údaje: New York Springer US 01.07.2021Vydané v Multimedia tools and applications (01.07.2021)“…In this paper, a novel image encryption algorithm based on a new discrete chaotic system is presented…”
Získať plný text
Journal Article -
20
Security enhancement and attack detection using optimized hybrid deep learning and improved encryption algorithm over Internet of Things
ISSN: 2665-9174, 2665-9174Vydavateľské údaje: Elsevier 01.12.2023Vydané v Measurement. Sensors (01.12.2023)“…). There has been an extensive analysis on the Internet traffic detection and classification in the past decade, however this is still a trending subject with respect to IoT…”
Získať plný text
Journal Article

