Search Results - "Encryption decryption algorithm"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography by Rathore, Manjari Singh, Poongodi, M., Saurabh, Praneet, Lilhore, Umesh Kumar, Bourouis, Sami, Alhakami, Wajdi, Osamor, Jude, Hamdi, Mounir

    ISSN: 0045-7906, 1879-0755
    Published: Elsevier Ltd 01.09.2022
    Published in Computers & electrical engineering (01.09.2022)
    “…•This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method…”
    Get full text
    Journal Article
  2. 2

    Event-based privacy-consensus control for multiagent systems: An enhanced framework for fault-tolerance and protection against eavesdropping by Hu, Xiaoyan, Ye, Dan

    ISSN: 0096-3003
    Published: Elsevier Inc 01.09.2025
    Published in Applied mathematics and computation (01.09.2025)
    “…This paper investigates the consensus problem of privacy protection for multi-agent systems (MASs) under conditions of compound faults. We develop a…”
    Get full text
    Journal Article
  3. 3

    Algebraic Coding Theory Using Pell Equation x2 − 8y2 = 1 by Janaki, G, Gowri, Shankari A

    ISSN: 1592-7415, 2282-8214
    Published: Pescara Accademia Piceno Aprutina dei Velati in Teramo (APAV) 01.03.2023
    Published in Ratio mathematica (01.03.2023)
    “…An interdisciplinary field with significant practical use is cryptography. The difficulty of specific mathematical computing tasks affects a public key…”
    Get full text
    Journal Article
  4. 4

    Design of Event-Triggered Secure Containment Controllers for Multi-Agent Systems over Signed Graphs by Zheng, Shaobo, Zhou, Lei

    ISSN: 0278-081X, 1531-5878
    Published: New York Springer US 01.06.2025
    Published in Circuits, systems, and signal processing (01.06.2025)
    “…This paper addresses the secure containment control problem for a class of discrete-time multi-agent systems with eavesdroppers under signed graphs, with a…”
    Get full text
    Journal Article
  5. 5

    Encryption-Decryption-Based Bipartite Synchronization of Markov Jump Coupled Neural Networks: An Event-Triggered Mechanism by Shi, Liangyao, Wang, Jing, Yan, Huaicheng, Cao, Jinde, Shen, Hao

    ISSN: 2327-4662, 2327-4662
    Published: IEEE 2025
    Published in IEEE internet of things journal (2025)
    “…This paper addresses the problem of encryption-decryption-based bipartite synchronization control for a class of discrete-time coupled neural networks, in…”
    Get full text
    Journal Article
  6. 6

    Word-based encryption algorithm using dictionary indexing with variable encryption key length by Al-Jarrah, Ahmad, Albsharat, Amer, Al-Jarrah, Mohammad

    ISSN: 2088-8708, 2722-2578, 2088-8708
    Published: Yogyakarta IAES Institute of Advanced Engineering and Science 01.02.2022
    “…This paper proposes a new algorithm for text encryption utilizing English words as a unit of encoding. The algorithm vanishes any feature that could be used to…”
    Get full text
    Journal Article
  7. 7

    A MESSAGE CRYPTOGRAPHY TECHNIQUE USING DNA BASED HYBRID APPROACH by Godbole, Vaibhav

    ISSN: 1985-6571
    Published: Kajang Science & Technology Research Institute for Defence (STRIDE) 01.01.2019
    Published in Defence S&T Technical Bulletin (01.01.2019)
    “…Cryptography makes the transmitted message unreadable to unauthorised users. DNA cryptography is being explored worldwide and even in being in its primitive…”
    Get full text
    Journal Article
  8. 8

    A Coding Algorithm using Super-edge Magic Total Labeling of Extended Duplicate Graphs by Jegan, R., Vijayakumar, P., Thirusangu, K.

    Published: IEEE 08.09.2022
    “…Graph labeling has wide applications in the field of radio astronomy, computer networks, communication networks and cryptography etc. Encoding is a technique…”
    Get full text
    Conference Proceeding
  9. 9

    Ensuring Cybersecurity of Data Transmission in Limited Energy Consumption Networks by Krasnov, A.N., Prakhova, M.Yu, Novikova, U.V.

    Published: IEEE 06.10.2020
    “…In the northern gas fields, most data are transmitted via wireless networks, which requires special transmission security measures. Herewith, the gas field…”
    Get full text
    Conference Proceeding
  10. 10

    Low-power Implementation of an Encryption/Decryption System with Asynchronous Techniques by Sklavos, Nikos, Papakonstantinou, Alexandros, Theoharis, Spyros, Koufopavlou, Odysseas

    ISSN: 1065-514X, 1563-5171
    Published: Hindawi Limiteds 2002
    Published in VLSI Design (2002)
    “…An asynchronous VLSI implementation of the International Data Encryption Algorithm (IDEA) is presented in this paper. In order to evaluate the asynchronous…”
    Get full text
    Journal Article
  11. 11

    Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism by Liu, Jinliang, Deng, Ying, Zha, Lijuan, Xie, Xiangpeng, Tian, Engang

    ISSN: 1049-8923, 1099-1239
    Published: Bognor Regis Wiley Subscription Services, Inc 10.05.2024
    “…The article concentrates on exploring the issue of privacy‐preserving sliding mode consensus of multi‐agent systems (MASs) with disturbance. An encryption and…”
    Get full text
    Journal Article
  12. 12

    Quantum Key Distribution: Simulation and Characterizations by Jasim, Omer K., Abbas, Safia, El-Horbaty, El-Sayed M., Salem, Abdel-Badeeh M.

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2015
    Published in Procedia computer science (2015)
    “…All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are…”
    Get full text
    Journal Article
  13. 13

    Bipartite Secure Consensus Control for Nonlinear Multi-agent Systems by Zheng, Shaobo, Zhou, Lei

    ISSN: 1948-9447
    Published: IEEE 25.05.2024
    Published in Chinese Control and Decision Conference (25.05.2024)
    “…This paper addresses the leaderless bipartite secure consensus problem for a class of discrete-time nonlinear multi-agent systems (MASs) with…”
    Get full text
    Conference Proceeding