Výsledky vyhledávání - "Symmetric-key algorithm"

  1. 1

    Development of modified AES algorithm for data security Autor Kumar, Puneet, Rana, Shashi B.

    ISSN: 0030-4026, 1618-1336
    Vydáno: Elsevier GmbH 01.02.2016
    Vydáno v Optik (Stuttgart) (01.02.2016)
    “…Cryptography is a process by which information or messages can be sent from one user to another user which provides several security services such as…”
    Získat plný text
    Journal Article
  2. 2

    A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module Autor Kim, Kyeeun, Park, Siwoong, Yeo, Chanil, Park, Hyoung-Jun, Kim, Hyunjin, Heo, Young Soon, Kang, Hyun Seo, Kim, Kyungsoo

    ISSN: 1424-8220, 1424-8220
    Vydáno: Switzerland MDPI 25.02.2021
    Vydáno v Sensors (Basel, Switzerland) (25.02.2021)
    “…In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in…”
    Získat plný text
    Journal Article
  3. 3

    Research on data transmission of wireless sensor networks based on symmetric key algorithm Autor Zhou, Wei, Li, Ping, Wang, QinJu, Nabipour, Narjes

    ISSN: 0263-2241, 1873-412X
    Vydáno: London Elsevier Ltd 01.03.2020
    “…•The decryption algorithm is used to decrypt the ciphertext.•Using penalty function to optimize node energy consumption during data transmission.•Improving the…”
    Získat plný text
    Journal Article
  4. 4

    Modified Vigenere cryptosystem: An integrated data encryption module for learning management system Autor Jason P. Sermeno, Kenrick Agustin S. Secugal, Nelly E. Mistio

    ISSN: 1727-2394
    Vydáno: 台灣 朝陽科技大學理工學院 01.06.2021
    “…Security is a practice of defending our computers, servers, networks, mobile devices, electronic systems, and digital information against accidental and…”
    Získat plný text
    Journal Article
  5. 5
  6. 6

    A computational algebraic geometry approach to analyze pseudo-random sequences based on Latin squares Autor Falcón, Raúl M., Álvarez, Víctor, Gudiel, Félix

    ISSN: 1019-7168, 1572-9044
    Vydáno: New York Springer US 01.08.2019
    Vydáno v Advances in computational mathematics (01.08.2019)
    “…Latin squares are used as scramblers on symmetric-key algorithms that generate pseudo-random sequences of the same length. The robustness and effectiveness of…”
    Získat plný text
    Journal Article
  7. 7

    Identifying Symmetric-Key Algorithms Using CNN in Intel Processor Trace Autor Yang, Wooyeol, Park, Yongsu

    ISSN: 2079-9292, 2079-9292
    Vydáno: Basel MDPI AG 01.10.2021
    Vydáno v Electronics (Basel) (01.10.2021)
    “…Malware and ransomware are often encrypted to protect their own code, making it challenging to apply reverse engineering to analyze them. Recently, various…”
    Získat plný text
    Journal Article
  8. 8

    轻量级Hash函数研究 Autor GONG, Zheng, 龚 征

    ISSN: 2097-4116
    Vydáno: Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 29.02.2016
    Vydáno v Journal of Cryptologic Research (29.02.2016)
    “…随着物联网技术及其相关应用的快速发展, 其信息安全性和隐私性也得到了业界的高度重视. 由于制造成本和便携性的限制, 物联网硬件的计算能力、存储能力和能量仍然受到非常大…”
    Získat plný text
    Journal Article
  9. 9

    Using a Hybrid Pseudorandom Number Generator for Cryptography in the Internet of Things Autor Jassim, Sameeh Abdulghafour, Farhan, Alaa K., Radie, A. Hussien

    Vydáno: IEEE 21.09.2021
    “…The rapid growth of mobile phones, telecommunication networks, and the internet resulted in the advent of the Internet of Things (IoT). As a result, the need…”
    Získat plný text
    Konferenční příspěvek
  10. 10

    Public key based key distribution scheme for wireless sensor networks Autor Huang, Jie, Huang, Bei

    ISSN: 1000-436X
    Vydáno: Editorial Department of Journal on Communications 01.10.2011
    Vydáno v Tongxin Xuebao (01.10.2011)
    “…Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN, a new public key based key…”
    Získat plný text
    Journal Article
  11. 11

    Data Security in Cloud Storage using Advanced Encryption Standard 256 Autor Bharadwaj, S., Navaroj, G. Indra

    Vydáno: IEEE 11.06.2025
    “…Because of cloud computing, more people can easily access data from afar, scalable services are available and this helps in education, healthcare, industry and…”
    Získat plný text
    Konferenční příspěvek
  12. 12

    Public key based key distribution scheme for wireless sensor networks Autor HUANG Jie1, HUANG Bei1

    ISSN: 1000-436X
    Vydáno: Editorial Department of Journal on Communications 01.01.2011
    Vydáno v Tongxin Xuebao (01.01.2011)
    “…Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN,a new public key based key…”
    Získat plný text
    Journal Article
  13. 13

    An Efficient approach of True Random Number Generation using A Data encryption method in Security & cryptography algorithm Autor Agnihotri, Prateek, Agarwal Mittal, Preeti

    Vydáno: IEEE 23.06.2023
    “…True random number generators (TRNGs) have drawn a lot of focus due to their numerous uses in data encryption and transfer. The encryption method or privacy…”
    Získat plný text
    Konferenční příspěvek
  14. 14

    Application of Symmetric Key Algorithm in Data Security Design of Smart Grid Autor Zhang, Yifan, Yu, Chaoyu, Wang, Yuqiang, Han, Junfei, Zhong, Ming, An, Haijun, Yuan, Ningping

    Vydáno: IEEE 01.06.2023
    “…There are a large number of distributed transaction management in the smart grid. If the traditional centralized control method is adopted, it will cause…”
    Získat plný text
    Konferenční příspěvek
  15. 15

    Information Security using GNU Privacy Guard Autor Syed, Dabeeruddin, Al-Ghushami, Abdullah Hussein, Zainab, Ameema, Abdulhamid, Shafii Muhammad, Al-Kuwari, Mohammed Salem Daen A

    Vydáno: IEEE 08.03.2023
    “…The CIA trinity of data system confidentiality, integrity, and availability is significantly reliant on communication networks in today's society. A major…”
    Získat plný text
    Konferenční příspěvek
  16. 16

    Critical Analysis of Cryptographic Algorithms Autor AlRoubiei, Mazoon, AlYarubi, Thuraiya, Kumar, Basant

    Vydáno: IEEE 01.06.2020
    “…Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive…”
    Získat plný text
    Konferenční příspěvek
  17. 17

    Empirical Bounds on the Rate of Secret Bits Extracted from Received Signal Strength Autor Azizi, Sima, Komaee, Arash

    Vydáno: IEEE 01.03.2019
    “…Symmetric cryptography relies on pairs of identical secret keys shared by the legitimate communicating parties. To implement a symmetric-key algorithm for…”
    Získat plný text
    Konferenční příspěvek
  18. 18

    Symmetric key based RFID authentication protocol with a secure key-updating scheme Autor Guangyu Zhu, Khan, Gul N.

    ISBN: 9781479900312, 1479900311
    ISSN: 0840-7789
    Vydáno: IEEE 01.05.2013
    “…RFID technology is being widely employed in various pervasive applications. Therefore, security and privacy protection for RFID systems is an important issue…”
    Získat plný text
    Konferenční příspěvek
  19. 19

    Digital Image Chaotic Encryption (DICE - A partial-symmetric key cipher for digital images) Autor Kaushik, Akhil, Satvika, Gupta, Krishan, Kumar, Anant

    ISBN: 1479939587, 9781479939589
    Vydáno: IEEE 01.02.2014
    “…The swift growth of communication facilities and ever decreasing cost of computer hardware has brought tremendous possibilities of expansion for commercial and…”
    Získat plný text
    Konferenční příspěvek
  20. 20

    The design and implementation of accelerated authentication system for mobile platform Autor LiPing Du, Ying Li, GuiFen Zhao

    ISBN: 142448104X, 9781424481040
    ISSN: 2162-5476
    Vydáno: IEEE 01.10.2010
    “…This paper designs and implements an accelerated authentication system for mobile platform. This system is based on CSK (combined symmetric key) algorithm and…”
    Získat plný text
    Konferenční příspěvek