Suchergebnisse - "cryptography algorithm"

  1. 1

    The unified image cryptography algorithm based on finite group von Zhang, Yong, Chen, Aiguo, Chen, Wei

    ISSN: 0957-4174, 1873-6793
    Veröffentlicht: Elsevier Ltd 01.02.2023
    Veröffentlicht in Expert systems with applications (01.02.2023)
    “… Image information security is an essential component of the network information security field. The main task of image cryptography is exploring the image …”
    Volltext
    Journal Article
  2. 2

    Securing Wireless Sensor Networks Against Denial‐of‐Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol von Fotohi, Reza, Firoozi Bari, Somayyeh, Yusefi, Mehdi

    ISSN: 1074-5351, 1099-1131
    Veröffentlicht: Chichester Wiley Subscription Services, Inc 01.03.2020
    Veröffentlicht in International journal of communication systems (01.03.2020)
    “… Summary Wireless sensor networks (WSNs) have been vastly employed in the collection and transmission of data via wireless networks. This type of network is …”
    Volltext
    Journal Article
  3. 3

    A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security von Adeniyi, Abidemi Emmanuel, Jimoh, Rasheed Gbenga, Awotunde, Joseph Bamidele

    ISSN: 0045-7906
    Veröffentlicht: Elsevier Ltd 01.08.2024
    Veröffentlicht in Computers & electrical engineering (01.08.2024)
    “… Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity protocols on IoT devices, platform packages, and Internet tools. A …”
    Volltext
    Journal Article
  4. 4

    RBJ25 cryptography algorithm for securing big data von Rajaprakash, S, Bagath Basha, C, Muthuselvan, S, Jaisankar, N, Singh, Ravi Pratap

    ISSN: 1742-6588, 1742-6596
    Veröffentlicht: Bristol IOP Publishing 01.12.2020
    Veröffentlicht in Journal of physics. Conference series (01.12.2020)
    “… To over this issue in this work we have proposed a new cryptography algorithm RBJ25 with the matrix order N …”
    Volltext
    Journal Article
  5. 5

    Secure medical image encryption with Walsh–Hadamard transform and lightweight cryptography algorithm von Kasim, Ömer

    ISSN: 0140-0118, 1741-0444, 1741-0444
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2022
    Veröffentlicht in Medical & biological engineering & computing (01.06.2022)
    “… It is important to ensure the privacy and security of the medical images that are produced with electronic health records. Security is ensured by encrypting …”
    Volltext
    Journal Article
  6. 6

    A Novel Chaos-Based Cryptography Algorithm and Its Performance Analysis von El-Latif, Ahmed A. Abd, Ramadoss, Janarthanan, Abd-El-Atty, Bassem, Khalifa, Hany S., Nazarimehr, Fahimeh

    ISSN: 2227-7390, 2227-7390
    Veröffentlicht: Basel MDPI AG 01.07.2022
    Veröffentlicht in Mathematics (Basel) (01.07.2022)
    “… Data security represents an essential task in the present day, in which chaotic models have an excellent role in designing modern cryptosystems. Here, a novel …”
    Volltext
    Journal Article
  7. 7

    A new cryptography algorithm for quantum images von Naseri, Mosayeb, Abdolmaleky, Mona, Laref, Amel, Parandin, Fariborz, Celik, Turgay, Farouk, Ahmed, Mohamadi, Masoumeh, Jalalian, Hesam

    ISSN: 0030-4026, 1618-1336
    Veröffentlicht: Elsevier GmbH 01.10.2018
    Veröffentlicht in Optik (Stuttgart) (01.10.2018)
    “… In this paper, a new bi-step quantum image cryptography algorithm is presented. The proposed scheme is consisted of four different coding algorithms …”
    Volltext
    Journal Article
  8. 8

    Evaluation of Cryptography Algorithm Based on Digital Identity Authentication von Zhang, Liang, Sheng, Jianqiao, Zhang, Yicao, Wu, Qiuyang

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2024
    Veröffentlicht in Procedia computer science (2024)
    “… Cryptography algorithm is an important means to achieve identity authentication, and it is also a key technology to achieve identity authentication …”
    Volltext
    Journal Article
  9. 9

    Image cryptography algorithm based on a new composite chaotic system and Latin square collaborative mechanism von Tian, Anhong, Yue, Zhongze, Fu, Chengbiao

    ISSN: 0143-8166
    Veröffentlicht: Elsevier Ltd 01.10.2025
    Veröffentlicht in Optics and lasers in engineering (01.10.2025)
    “… •A general two-dimensional composite hyperchaotic system (2D-CHS) model is proposed.•Theoretical confirms that chaotic maps generated by 2D-CHS exhibit chaotic …”
    Volltext
    Journal Article
  10. 10

    Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks von Nadeem, Muhammad, Arshad, Ali, Riaz, Saman, Syeda Zahra, Band, Shahab, Mosavi, Amir

    ISSN: 1546-2218, 1546-2226
    Veröffentlicht: Henderson Tech Science Press 01.01.2023
    Veröffentlicht in Computers, materials & continua (01.01.2023)
    “… In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud server data securely …”
    Volltext
    Journal Article
  11. 11

    Federated meta heuristic cryptography algorithm with fuzzy logic model in cloud secure data migration von Srinivasan, Kannan, Chauhan, Guman Singh, Jadon, Rahul, Budda, Rajababu, Gollapalli, Venkata Surya Teja, Awotunde, Joseph Bamidele

    ISSN: 1386-7857, 1573-7543
    Veröffentlicht: New York Springer US 01.12.2025
    Veröffentlicht in Cluster computing (01.12.2025)
    “… In the modern world, cloud computing has profoundly changed almost every aspect of our lives and organizational structures. It is without a doubt one of the …”
    Volltext
    Journal Article
  12. 12

    Security protocol using elliptic curve cryptography algorithm for wireless sensor networks von Qazi, Rosheen, Qureshi, Kashif Naseer, Bashir, Faisal, Islam, Najam Ul, Iqbal, Saleem, Arshad, Arsalan

    ISSN: 1868-5137, 1868-5145
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.01.2021
    “… Information security broadly refers to the state of protection against unsanctioned access to information or data, principally electronic or digital data. In …”
    Volltext
    Journal Article
  13. 13

    Optical Bit-Plane-Based 3D-JST Cryptography Algorithm With Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication von El-Shafai, Walid, Almomani, Iman M., Alkhayer, Aala

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2021
    Veröffentlicht in IEEE access (2021)
    “… The rapid growth of multimedia communication systems has expanded the High-Efficiency Video Coding (HEVC) security applications precipitously. Therefore, there …”
    Volltext
    Journal Article
  14. 14

    Channel estimation and secure data transmission using hybrid particle swarm optimisation–gray wolf optimisation‐leaky least‐Mean‐Square and affine elliptic curves cryptography algorithm in MU‐multi‐input multi‐output orthogonal frequency division multiplexing system von R, Jeya, Amutha, B.

    ISSN: 1074-5351, 1099-1131
    Veröffentlicht: 10.01.2025
    Veröffentlicht in International journal of communication systems (10.01.2025)
    “… Summary In a huge multi‐input multi‐output orthogonal frequency divisions multiplexing (MIMO‐OFDM), an exact Channel State Information (CSI) is required to …”
    Volltext
    Journal Article
  15. 15

    Implementation of RC4 Cryptography Algorithm for Data File Security von Doni, A F, Maria, O A H, Hanif, S

    ISSN: 1742-6588, 1742-6596
    Veröffentlicht: Bristol IOP Publishing 01.07.2020
    Veröffentlicht in Journal of physics. Conference series (01.07.2020)
    “… In research that has been done using RC4 Cryptography Algorithm for Encryption and Decryption in Data Files shows that the RC4 algorithm can run well and is able to secure the authenticity …”
    Volltext
    Journal Article
  16. 16

    Hybrid Cryptography Algorithm with Precomputation for Advanced Metering Infrastructure Networks von Khasawneh, Samer, Kadoch, Michel

    ISSN: 1383-469X, 1572-8153
    Veröffentlicht: New York Springer US 01.08.2018
    Veröffentlicht in Mobile networks and applications (01.08.2018)
    “… Two-way communication has been identified as the smart grid flagship feature that enables the smart grid to attain its outcomes over the legacy power grid …”
    Volltext
    Journal Article
  17. 17

    Orbital Satellite Communication Encryption Algorithm Based on Elliptic Curve Cryptography Algorithm von Yuan, Haojie, Wang, Yulu, Tang, Gang

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2025
    Veröffentlicht in Procedia computer science (2025)
    “… In orbital satellite communication systems, there is a large amount of user sensitive data. In order to ensure the security of the data, but also to ensure the …”
    Volltext
    Journal Article
  18. 18

    An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm von Aparna Puvvadi, Kishore Polurie Venkata Vijay

    ISSN: 0334-1860, 2191-026X
    Veröffentlicht: De Gruyter 01.01.2018
    Veröffentlicht in Journal of intelligent systems (01.01.2018)
    “… The main objective of this paper is to propose a medical image watermarking technique in E-healthcare application based on the hybridization of compression and cryptography algorithm …”
    Volltext
    Journal Article
  19. 19

    Finite Field-Based Three-Tier Cryptography Algorithm to Secure the Images von Lavanya, M, Abraham Sundar, K Joseph, Saravanan, S

    ISSN: 0011-748X
    Veröffentlicht: New Delhi Defence Scientific Information & Documentation Centre 01.01.2025
    Veröffentlicht in Defense science journal (01.01.2025)
    “… A finite field-based image cryptography algorithm called TIEA (Three-tier Image Encryption Algorithm …”
    Volltext
    Journal Article
  20. 20

    A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services von Awasthi, Charu, Prakash, Satya, Kumar Mishra, Prashant

    ISSN: 2573-8240, 2573-8240
    Veröffentlicht: United States Partners in Digital Health 2024
    Veröffentlicht in Blockchain in healthcare today (2024)
    “… Fog computing is an emerging technology that extends the capability and efficiency of cloud computing networks by acting as a bridge among the cloud and the …”
    Volltext
    Journal Article