Search Results - "Encryption and Decryption Algorithm"
-
1
Encryption and decryption algorithm based on the Latin groupoid isotopes
ISSN: 2537-6284, 2587-3644Published: "Ion Creanga" State Pedagogical University 01.09.2023Published in Acta et Commentationes: Ştiinţe Exacte şi ale Naturii (01.09.2023)“…This paper studies encryption and decryption algorithm, using isotopes of Latin groupoid. Cryptographic algorithms are computationally intensive processes…”
Get full text
Journal Article -
2
A plaintext-related image encryption algorithm based on chaos
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.03.2018Published in Multimedia tools and applications (01.03.2018)“…A symmetric key image cryptosystem based on the piecewise linear map is presented in this paper. In this cryptosystem, the encryption process and the…”
Get full text
Journal Article -
3
An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.06.2023Published in Multimedia tools and applications (01.06.2023)“…A Wireless Body Area Network (WBAN) is a network of wireless sensor nodes that can be installed inside or outside of the human body. This network is crucial in…”
Get full text
Journal Article -
4
FPGA Accelerator for 3DES Algorithm Based on OpenCL
ISSN: 1000-3428Published: Editorial Office of Computer Engineering 01.12.2021Published in Ji suan ji gong cheng (01.12.2021)“…Nowadays, encryption and decryption algorithms are widely used in digital currency, blockchain, cloud data encryption and other fields.Traditional…”
Get full text
Journal Article -
5
A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm
ISSN: 0929-6212, 1572-834XPublished: New York Springer US 01.11.2022Published in Wireless personal communications (01.11.2022)“…In order to solve the problems of low transmission efficiency and high transmission bit error rate in traditional transmission methods, a new secure…”
Get full text
Journal Article -
6
Hardware Implementation of AES Encryption and Decryption System Based on FPGA
ISSN: 1874-110X, 1874-110XPublished: 15.09.2015Published in The open cybernetics & systemics journal (15.09.2015)Get full text
Journal Article -
7
Utilization of Mobile Agents for Building a Secure Decentralized Energy System with Remote Monitoring
ISSN: 2210-142XPublished: 01.07.2016Published in International Journal of Computing and Digital System (Jāmiʻat al-Baḥrayn. Markaz al-Nashr al-ʻIlmī) (01.07.2016)Get full text
Journal Article -
8
Cryptography and Adversarial Analysis for Cloud Data Security
Published: IEEE 15.03.2024Published in 2024 5th International Conference on Innovative Trends in Information Technology (ICITIIT) (15.03.2024)“…Cloud computing, a novel paradigm for distributed data processing, has emerged as a transformative technology enabling the storage and retrieval of data over…”
Get full text
Conference Proceeding -
9
Power Data Collection Terminal Protection Based On SM9
ISSN: 2642-6226Published: IEEE 08.12.2021Published in Proceedings (International Conference on Power System Technology. Online) (08.12.2021)“…With the proposal of the development plan of the Power and Internet of things, the power data collection terminal has received strong attention. However, due…”
Get full text
Conference Proceeding -
10
Performance Test and Analysis of National Secret Algorithm SM2 in Power Data Protection
Published: IEEE 22.10.2021Published in 2021 IEEE 5th Conference on Energy Internet and Energy System Integration (EI2) (22.10.2021)“…Power data contains a wealth of privacy information. Data protection has always been an urgent problem to pay attention to. Domestic cryptographic algorithm is…”
Get full text
Conference Proceeding -
11
Analysis of the influence of CAN bus encryption and decryption on real time performance
Published: IEEE 01.07.2021Published in 2021 2nd International Conference on Computer Communication and Network Security (CCNS) (01.07.2021)“…With the rapid development of intelligent network connected vehicle, information security has been paid more and more attention. In order to solve the problem…”
Get full text
Conference Proceeding -
12
Building a Secure Decentralized Energy System with Remote Monitoring Using Mobile Agents
Published: IEEE 01.10.2015Published in 2015 Fifth International Conference on e-Learning (econf) (01.10.2015)“…Centralized systems have failed in remote rural areas due to weak infrastructures, roads between urban habitations are in a very bad condition even if found,…”
Get full text
Conference Proceeding -
13
Applying decentralized approach based on mobile agent for improving e-transaction system
ISBN: 9781467355650, 1467355658Published: IEEE 01.12.2012Published in 2012 8th International Computer Engineering Conference (ICENCO) (01.12.2012)“…In this paper, we propose a solution which can not only satisfy security demands like confidentiality and integrity for data carried during e-transaction, but…”
Get full text
Conference Proceeding -
14
Two Improved Algorithms Based on Character Encryption and Decryption
ISBN: 1424482313, 9781424482313Published: IEEE 01.07.2010Published in 2010 Third International Symposiums on Electronic Commerce and Security (01.07.2010)“…To improve the weakness that the same plaintext strings have the same ciphertext strings in character encryption and decryption scheme based on a shift…”
Get full text
Conference Proceeding -
15
Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations
ISSN: 0020-7748, 1572-9575Published: Boston Springer US 01.06.2013Published in International journal of theoretical physics (01.06.2013)“…Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the…”
Get full text
Journal Article -
16
Speed Up Image Encryption by Using RSA Algorithm
ISBN: 1728151961, 9781728151960ISSN: 2575-7288Published: IEEE 01.03.2020Published in International Conference on Advanced Computing and Communication Systems (Online) (01.03.2020)“…Since the existing RSA Algorithm needs long key sizes, requires big memory spaces and also a long execution time, it seems necessary to make some changes or…”
Get full text
Conference Proceeding -
17
Three Diamentional Object Used for Data Security
ISBN: 142448653X, 9781424486533Published: IEEE 01.11.2010Published in 2010 International Conference on Computational Intelligence and Communication Networks (01.11.2010)“…Current authentication systems suffer from many weaknesses. Textual passwords are commonly used, however, users do not follow their requirements. Users tend to…”
Get full text
Conference Proceeding

