Search Results - "Encryption decryption algorithm"
-
1
A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
ISSN: 0045-7906, 1879-0755Published: Elsevier Ltd 01.09.2022Published in Computers & electrical engineering (01.09.2022)“…•This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method…”
Get full text
Journal Article -
2
Event-based privacy-consensus control for multiagent systems: An enhanced framework for fault-tolerance and protection against eavesdropping
ISSN: 0096-3003Published: Elsevier Inc 01.09.2025Published in Applied mathematics and computation (01.09.2025)“…This paper investigates the consensus problem of privacy protection for multi-agent systems (MASs) under conditions of compound faults. We develop a…”
Get full text
Journal Article -
3
Algebraic Coding Theory Using Pell Equation x2 − 8y2 = 1
ISSN: 1592-7415, 2282-8214Published: Pescara Accademia Piceno Aprutina dei Velati in Teramo (APAV) 01.03.2023Published in Ratio mathematica (01.03.2023)“…An interdisciplinary field with significant practical use is cryptography. The difficulty of specific mathematical computing tasks affects a public key…”
Get full text
Journal Article -
4
Design of Event-Triggered Secure Containment Controllers for Multi-Agent Systems over Signed Graphs
ISSN: 0278-081X, 1531-5878Published: New York Springer US 01.06.2025Published in Circuits, systems, and signal processing (01.06.2025)“…This paper addresses the secure containment control problem for a class of discrete-time multi-agent systems with eavesdroppers under signed graphs, with a…”
Get full text
Journal Article -
5
Encryption-Decryption-Based Bipartite Synchronization of Markov Jump Coupled Neural Networks: An Event-Triggered Mechanism
ISSN: 2327-4662, 2327-4662Published: IEEE 2025Published in IEEE internet of things journal (2025)“…This paper addresses the problem of encryption-decryption-based bipartite synchronization control for a class of discrete-time coupled neural networks, in…”
Get full text
Journal Article -
6
Word-based encryption algorithm using dictionary indexing with variable encryption key length
ISSN: 2088-8708, 2722-2578, 2088-8708Published: Yogyakarta IAES Institute of Advanced Engineering and Science 01.02.2022Published in International journal of electrical and computer engineering (Malacca, Malacca) (01.02.2022)“…This paper proposes a new algorithm for text encryption utilizing English words as a unit of encoding. The algorithm vanishes any feature that could be used to…”
Get full text
Journal Article -
7
A MESSAGE CRYPTOGRAPHY TECHNIQUE USING DNA BASED HYBRID APPROACH
ISSN: 1985-6571Published: Kajang Science & Technology Research Institute for Defence (STRIDE) 01.01.2019Published in Defence S&T Technical Bulletin (01.01.2019)“…Cryptography makes the transmitted message unreadable to unauthorised users. DNA cryptography is being explored worldwide and even in being in its primitive…”
Get full text
Journal Article -
8
A Coding Algorithm using Super-edge Magic Total Labeling of Extended Duplicate Graphs
Published: IEEE 08.09.2022Published in 2022 Second International Conference on Computer Science, Engineering and Applications (ICCSEA) (08.09.2022)“…Graph labeling has wide applications in the field of radio astronomy, computer networks, communication networks and cryptography etc. Encoding is a technique…”
Get full text
Conference Proceeding -
9
Ensuring Cybersecurity of Data Transmission in Limited Energy Consumption Networks
Published: IEEE 06.10.2020Published in 2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon) (06.10.2020)“…In the northern gas fields, most data are transmitted via wireless networks, which requires special transmission security measures. Herewith, the gas field…”
Get full text
Conference Proceeding -
10
Low-power Implementation of an Encryption/Decryption System with Asynchronous Techniques
ISSN: 1065-514X, 1563-5171Published: Hindawi Limiteds 2002Published in VLSI Design (2002)“…An asynchronous VLSI implementation of the International Data Encryption Algorithm (IDEA) is presented in this paper. In order to evaluate the asynchronous…”
Get full text
Journal Article -
11
Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism
ISSN: 1049-8923, 1099-1239Published: Bognor Regis Wiley Subscription Services, Inc 10.05.2024Published in International journal of robust and nonlinear control (10.05.2024)“…The article concentrates on exploring the issue of privacy‐preserving sliding mode consensus of multi‐agent systems (MASs) with disturbance. An encryption and…”
Get full text
Journal Article -
12
Quantum Key Distribution: Simulation and Characterizations
ISSN: 1877-0509, 1877-0509Published: Elsevier B.V 2015Published in Procedia computer science (2015)“…All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are…”
Get full text
Journal Article -
13
Bipartite Secure Consensus Control for Nonlinear Multi-agent Systems
ISSN: 1948-9447Published: IEEE 25.05.2024Published in Chinese Control and Decision Conference (25.05.2024)“…This paper addresses the leaderless bipartite secure consensus problem for a class of discrete-time nonlinear multi-agent systems (MASs) with…”
Get full text
Conference Proceeding