Výsledky vyhledávání - "Symmetric-key algorithm"
-
1
Development of modified AES algorithm for data security
ISSN: 0030-4026, 1618-1336Vydáno: Elsevier GmbH 01.02.2016Vydáno v Optik (Stuttgart) (01.02.2016)“…Cryptography is a process by which information or messages can be sent from one user to another user which provides several security services such as…”
Získat plný text
Journal Article -
2
A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module
ISSN: 1424-8220, 1424-8220Vydáno: Switzerland MDPI 25.02.2021Vydáno v Sensors (Basel, Switzerland) (25.02.2021)“…In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in…”
Získat plný text
Journal Article -
3
Research on data transmission of wireless sensor networks based on symmetric key algorithm
ISSN: 0263-2241, 1873-412XVydáno: London Elsevier Ltd 01.03.2020Vydáno v Measurement : journal of the International Measurement Confederation (01.03.2020)“…•The decryption algorithm is used to decrypt the ciphertext.•Using penalty function to optimize node energy consumption during data transmission.•Improving the…”
Získat plný text
Journal Article -
4
Modified Vigenere cryptosystem: An integrated data encryption module for learning management system
ISSN: 1727-2394Vydáno: 台灣 朝陽科技大學理工學院 01.06.2021Vydáno v International Journal of Applied Science and Engineering (01.06.2021)“…Security is a practice of defending our computers, servers, networks, mobile devices, electronic systems, and digital information against accidental and…”
Získat plný text
Journal Article -
5
Modified Vigenere cryptosystem: An integrated data encryption module for learning management system
ISSN: 1727-2394, 1727-7841Vydáno: 2021Vydáno v International Journal of Applied Science and Engineering (2021)Získat plný text
Journal Article -
6
A computational algebraic geometry approach to analyze pseudo-random sequences based on Latin squares
ISSN: 1019-7168, 1572-9044Vydáno: New York Springer US 01.08.2019Vydáno v Advances in computational mathematics (01.08.2019)“…Latin squares are used as scramblers on symmetric-key algorithms that generate pseudo-random sequences of the same length. The robustness and effectiveness of…”
Získat plný text
Journal Article -
7
Identifying Symmetric-Key Algorithms Using CNN in Intel Processor Trace
ISSN: 2079-9292, 2079-9292Vydáno: Basel MDPI AG 01.10.2021Vydáno v Electronics (Basel) (01.10.2021)“…Malware and ransomware are often encrypted to protect their own code, making it challenging to apply reverse engineering to analyze them. Recently, various…”
Získat plný text
Journal Article -
8
轻量级Hash函数研究
ISSN: 2097-4116Vydáno: Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 29.02.2016Vydáno v Journal of Cryptologic Research (29.02.2016)“…随着物联网技术及其相关应用的快速发展, 其信息安全性和隐私性也得到了业界的高度重视. 由于制造成本和便携性的限制, 物联网硬件的计算能力、存储能力和能量仍然受到非常大…”
Získat plný text
Journal Article -
9
Using a Hybrid Pseudorandom Number Generator for Cryptography in the Internet of Things
Vydáno: IEEE 21.09.2021Vydáno v 2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA) (21.09.2021)“…The rapid growth of mobile phones, telecommunication networks, and the internet resulted in the advent of the Internet of Things (IoT). As a result, the need…”
Získat plný text
Konferenční příspěvek -
10
Public key based key distribution scheme for wireless sensor networks
ISSN: 1000-436XVydáno: Editorial Department of Journal on Communications 01.10.2011Vydáno v Tongxin Xuebao (01.10.2011)“…Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN, a new public key based key…”
Získat plný text
Journal Article -
11
Data Security in Cloud Storage using Advanced Encryption Standard 256
Vydáno: IEEE 11.06.2025Vydáno v 2025 3rd International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS) (11.06.2025)“…Because of cloud computing, more people can easily access data from afar, scalable services are available and this helps in education, healthcare, industry and…”
Získat plný text
Konferenční příspěvek -
12
Public key based key distribution scheme for wireless sensor networks
ISSN: 1000-436XVydáno: Editorial Department of Journal on Communications 01.01.2011Vydáno v Tongxin Xuebao (01.01.2011)“…Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN,a new public key based key…”
Získat plný text
Journal Article -
13
An Efficient approach of True Random Number Generation using A Data encryption method in Security & cryptography algorithm
Vydáno: IEEE 23.06.2023Vydáno v 2023 International Conference on IoT, Communication and Automation Technology (ICICAT) (23.06.2023)“…True random number generators (TRNGs) have drawn a lot of focus due to their numerous uses in data encryption and transfer. The encryption method or privacy…”
Získat plný text
Konferenční příspěvek -
14
Application of Symmetric Key Algorithm in Data Security Design of Smart Grid
Vydáno: IEEE 01.06.2023Vydáno v 2023 International Conference on Mechatronics, IoT and Industrial Informatics (ICMIII) (01.06.2023)“…There are a large number of distributed transaction management in the smart grid. If the traditional centralized control method is adopted, it will cause…”
Získat plný text
Konferenční příspěvek -
15
Information Security using GNU Privacy Guard
Vydáno: IEEE 08.03.2023Vydáno v 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC) (08.03.2023)“…The CIA trinity of data system confidentiality, integrity, and availability is significantly reliant on communication networks in today's society. A major…”
Získat plný text
Konferenční příspěvek -
16
Critical Analysis of Cryptographic Algorithms
Vydáno: IEEE 01.06.2020Vydáno v 2020 8th International Symposium on Digital Forensics and Security (ISDFS) (01.06.2020)“…Security is the most important role in data communication due to the increase of the intruder's possibility of alteration and eavesdropping to the sensitive…”
Získat plný text
Konferenční příspěvek -
17
Empirical Bounds on the Rate of Secret Bits Extracted from Received Signal Strength
Vydáno: IEEE 01.03.2019Vydáno v 2019 53rd Annual Conference on Information Sciences and Systems (CISS) (01.03.2019)“…Symmetric cryptography relies on pairs of identical secret keys shared by the legitimate communicating parties. To implement a symmetric-key algorithm for…”
Získat plný text
Konferenční příspěvek -
18
Symmetric key based RFID authentication protocol with a secure key-updating scheme
ISBN: 9781479900312, 1479900311ISSN: 0840-7789Vydáno: IEEE 01.05.2013Vydáno v 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) (01.05.2013)“…RFID technology is being widely employed in various pervasive applications. Therefore, security and privacy protection for RFID systems is an important issue…”
Získat plný text
Konferenční příspěvek -
19
Digital Image Chaotic Encryption (DICE - A partial-symmetric key cipher for digital images)
ISBN: 1479939587, 9781479939589Vydáno: IEEE 01.02.2014Vydáno v 2014 International Conference on Reliability Optimization and Information Technology (ICROIT) (01.02.2014)“…The swift growth of communication facilities and ever decreasing cost of computer hardware has brought tremendous possibilities of expansion for commercial and…”
Získat plný text
Konferenční příspěvek -
20
The design and implementation of accelerated authentication system for mobile platform
ISBN: 142448104X, 9781424481040ISSN: 2162-5476Vydáno: IEEE 01.10.2010Vydáno v 2010 International Conference on Information, Networking and Automation (ICINA) (01.10.2010)“…This paper designs and implements an accelerated authentication system for mobile platform. This system is based on CSK (combined symmetric key) algorithm and…”
Získat plný text
Konferenční příspěvek

