Suchergebnisse - "Tiny Encryption algorithm"
-
1
A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices
ISSN: 2073-8994, 2073-8994Veröffentlicht: Basel MDPI AG 01.02.2019Veröffentlicht in Symmetry (Basel) (01.02.2019)“… Recent advancements in wireless technology have created an exponential rise in the number of connected devices leading to the internet of things (IoT) …”
Volltext
Journal Article -
2
CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain management
ISSN: 1573-7721, 1380-7501, 1573-7721Veröffentlicht: New York Springer US 01.04.2025Veröffentlicht in Multimedia tools and applications (01.04.2025)“… Supply chain management (SCM), an essential part of E-Commerce, is required to plan, control, and procurement raw materials, manufacturing, and distribution of …”
Volltext
Journal Article -
3
ENCRYPTION THREE-DIMENSION IMAGE USING TINY ALGORITHM
ISSN: 2313-190X, 2520-4912Veröffentlicht: University of Information Technology and Communications 01.12.2020Veröffentlicht in Iraqi journal for computers and informatics (Online) (01.12.2020)“… The development of systems allows providing the capability of using three-dimension (3D) pictures over the internet especially in social media. In previous …”
Volltext
Journal Article -
4
A Dynamic Step-wise Tiny Encryption Algorithm with Fruit Fly Optimization for Quality of Service improvement in healthcare
ISSN: 2772-4425, 2772-4425Veröffentlicht: Elsevier Inc 01.11.2023Veröffentlicht in Healthcare analytics (New York, N.Y.) (01.11.2023)“… Healthcare highly depends on accessing, processing, analyzing, sharing, and storing electronic data. Cloud computing has evolved in various healthcare fields, …”
Volltext
Journal Article -
5
Revolutionizing XTEA: Unveiling PREXTEA and TRIXTEA-Enhanced Efficiency and Security in Internet of Things
ISSN: 2327-4662, 2327-4662Veröffentlicht: Piscataway IEEE 15.02.2025Veröffentlicht in IEEE internet of things journal (15.02.2025)“… The future of Internet is envisioned as the Internet of Things (IoT), a concept where countless physical objects, many of which possess limited or minimal …”
Volltext
Journal Article -
6
Adaptive Entropy Lightweight Encryption Estimate for Software Defined Network to Mitigate Data Security Threats in Smart Cities
ISSN: 2161-3915, 2161-3915Veröffentlicht: Chichester, UK John Wiley & Sons, Ltd 01.02.2025Veröffentlicht in Transactions on emerging telecommunications technologies (01.02.2025)“… ABSTRACT Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system …”
Volltext
Journal Article -
7
Bi primitive switching crypto system with key generation mechanism for secure applications
ISSN: 0253-3839, 2158-7299Veröffentlicht: Taylor & Francis 19.05.2014Veröffentlicht in Journal of the Chinese Institute of Engineers (19.05.2014)“… Ensuring security to the information transaction is a major challenge in the communication environment. The choice to guarantee the data transfer using a …”
Volltext
Journal Article -
8
Breaching Security of Full Round Tiny Encryption Algorithm
ISSN: 1930-1650, 1930-1669Veröffentlicht: Hershey IGI Global 01.01.2018Veröffentlicht in International journal of information security and privacy (01.01.2018)“… Tiny encryption algorithm is a 64-bit block cipher designed by Wheeler and Needham in 1994 and attracted much of its attention due to its capability of …”
Volltext
Journal Article -
9
Design and Implementation of Derivation Cryptographic Algorithms in Embedded Contactless IC Card System
ISBN: 303785426X, 9783037854266ISSN: 1660-9336, 1662-7482, 1662-7482Veröffentlicht: Zurich Trans Tech Publications Ltd 01.06.2012Veröffentlicht in Applied Mechanics and Materials (01.06.2012)“… The paper studied the security measures of contactless IC card system. Derivation cryptographic algorithms were used in the embedded IC card system to generate …”
Volltext
Journal Article -
10
Study on TEA Encryption for Public Communication Network Wireless Remoter
ISBN: 3038351180, 9783038351184ISSN: 1660-9336, 1662-7482, 1662-7482Veröffentlicht: Zurich Trans Tech Publications Ltd 01.06.2014Veröffentlicht in Applied Mechanics and Materials (01.06.2014)“… In order to realize wireless remoter not only securely but also quickly data transmission in the public communication network, the Tiny Encryption Algorithm …”
Volltext
Journal Article -
11
An evolutionary computation attack on one-round TEA
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2011Veröffentlicht in Procedia computer science (2011)“… In this work, one-round Tiny Encryption Algorithm (TEA) is attacked with an Evolutionary Computation method inspired by a combination of Genetic Algorithm (GA) …”
Volltext
Journal Article -
12
Securing IoT Devices with Enhanced Tiny Encryption Algorithm
Veröffentlicht: IEEE 04.12.2024Veröffentlicht in 2024 3rd International Conference on Automation, Computing and Renewable Systems (ICACRS) (04.12.2024)“… The exponential growth of Internet of Things (IoT) devices has brought about significant security challenges, particularly due to their limited computational …”
Volltext
Tagungsbericht -
13
Demitasse: A "Small" Version of the Tiny Encryption Algorithm and Its Use in a Classroom Setting
ISSN: 0161-1194, 1558-1586Veröffentlicht: Philadelphia, PA Taylor & Francis Group 01.01.2013Veröffentlicht in Cryptologia (01.01.2013)“… This article describes Demitasse, a cipher that is intended to be used by inexperienced students in a classroom setting. The cipher is based on the Tiny …”
Volltext
Journal Article -
14
Tiny Encryption Algorithm on Discrete Cosine Transform Watermarking
Veröffentlicht: IEEE 09.04.2021Veröffentlicht in 2021 3rd East Indonesia Conference on Computer and Information Technology (EIConCIT) (09.04.2021)“… Watermarking is a method embeds a secret imformation into a host such that can not be detected by the human senses. Hiding the secret information such as legal …”
Volltext
Tagungsbericht -
15
Secured IoT Based Smart Greenhouse System with Image Inspection
ISBN: 1728151961, 9781728151960ISSN: 2575-7288Veröffentlicht: IEEE 01.03.2020Veröffentlicht in International Conference on Advanced Computing and Communication Systems (Online) (01.03.2020)“… Automated Greenhouse System helps the farmers by controlling the environmental parameters through Internet of Things(IoT), including crop health inspection …”
Volltext
Tagungsbericht -
16
Usability Assessment on Symmetric Cryptography Learning Module
Veröffentlicht: IEEE 13.10.2020Veröffentlicht in 2020 2nd International Conference on Computer and Information Sciences (ICCIS) (13.10.2020)“… Teaching information security requires lecturer to introduce several tools to encourage students performing hands on practices in better way in order to …”
Volltext
Tagungsbericht -
17
Avoidance of Replay attack in CAN protocol using Authenticated Encryption
Veröffentlicht: IEEE 01.07.2020Veröffentlicht in 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (01.07.2020)“… Controller Area Network is the prominent communication protocol in automotive systems. Its salient features of arbitration, message filtering, error detection, …”
Volltext
Tagungsbericht -
18
Comparison of Implementation Tiny Encryption Algorithm (TEA) and Advanced Encryption Standard (AES) Algorithm on Android Based Open Source Cryptomator Library
Veröffentlicht: IEEE 01.11.2018Veröffentlicht in 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI) (01.11.2018)“… Android based open source cryptomator library is an open source library created by Skymatic and published on the cryptomator.org page. This library uses the …”
Volltext
Tagungsbericht -
19
High throughput implementations of cryptography algorithms on GPU and FPGA
ISBN: 9781467346214, 1467346217ISSN: 1091-5281Veröffentlicht: IEEE 01.05.2013Veröffentlicht in 2013 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) (01.05.2013)“… Cryptography algorithms are ranked by their speed in encrypting/decrypting data and their robustness to withstand attacks. Real-time processing of data …”
Volltext
Tagungsbericht -
20
FPGA Based Implementation Scenarios of TEA Block Cipher
Veröffentlicht: IEEE 01.12.2015Veröffentlicht in 2015 13th International Conference on Frontiers of Information Technology (FIT) (01.12.2015)“… Transmission of sensitive data over some channel is a highly security constrained scenario and thus demands the application of some encryption algorithm. It is …”
Volltext
Tagungsbericht

