Suchergebnisse - "cryptography algorithm"
-
1
A Psychoanalysis of Data Privacy Maintenance Issues in Social Network using Data mining
ISSN: 2249-8958, 2249-8958Veröffentlicht: 30.10.2019Veröffentlicht in International journal of engineering and advanced technology (30.10.2019)“… A safe information sharing subject proposed in OSNs upheld figure content approach trait based and Elliptic Curve Cryptography algorithmic principle re-encryption and mystery sharing …”
Volltext
Journal Article -
2
Performance Enhancement of State-of-the-Art Cryptography Algorithms in the Banking Sector
Veröffentlicht: IEEE 01.09.2023Veröffentlicht in 2023 Third International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS) (01.09.2023)“… Data security is a complex subject in today's world that affects both data storage and data transmission …”
Volltext
Tagungsbericht -
3
Comparative Analysis of Impact of Cryptography Algorithms on Wireless Sensor Networks
ISSN: 2331-8422Veröffentlicht: Ithaca Cornell University Library, arXiv.org 05.07.2021Veröffentlicht in arXiv.org (05.07.2021)“… Cryptography techniques are essential for a robust and stable security design of a system to mitigate the risk of external attacks and thus improve its …”
Volltext
Paper -
4
Cryptography: algorithms and standards
ISBN: 9780780393134, 0780393139ISSN: 2162-7843Veröffentlicht: IEEE 2005Veröffentlicht in Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005 (2005)Volltext
Tagungsbericht -
5
Symmetric Block Algorithm WBC1 and Analysis of Its Implementation Complexity
ISSN: 2707-4501, 2707-451XVeröffentlicht: V.M. Glushkov Institute of Cybernetics 28.03.2025Veröffentlicht in Kìbernetika ta komp'ûternì tehnologìï (Online) (28.03.2025)“… Introduction. Nowadays, computer networks are gaining more and more importance for information exchange. Cryptography plays a vital role in the security of …”
Volltext
Journal Article -
6
Enhancing the Security of the Internet of Things by the Application of Robust Cryptographic Algorithms
Veröffentlicht: IEEE 11.07.2025Veröffentlicht in 2025 2nd International Conference on New Frontiers in Communication, Automation, Management and Security (ICCAMS) (11.07.2025)“… The Internet of Things (IoT) is becoming a crucial part of the Internet and the foundation for millions of intelligent, interlinked things that might subject to many types of assaults …”
Volltext
Tagungsbericht -
7
E-lerning concept design of rijndael encryption process
Veröffentlicht: IEEE 01.08.2013Veröffentlicht in 2013 IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE) (01.08.2013)“… Numbers of meeting for the subject do not enable students to learn the cryptography algorithm that make the students do not fully understand about the working way of some cryptography algorithms …”
Volltext
Tagungsbericht -
8
Taking Flexible and Diverse Approaches to Get Undergraduate Students Interested in Cryptography Course
ISBN: 1424435811, 9781424435814, 0769535577, 9780769535579Veröffentlicht: IEEE 01.03.2009Veröffentlicht in 2009 First International Workshop on Education Technology and Computer Science (01.03.2009)“… With the extensive application of cryptography technologies in our lives, cryptography course has been paid more attention to in many universities. The …”
Volltext
Tagungsbericht -
9
Study and Development of a New Symmetric Key Management Scheme for Wireless Sensor Networks
ISSN: 2331-8422Veröffentlicht: Ithaca Cornell University Library, arXiv.org 31.12.2016Veröffentlicht in arXiv.org (31.12.2016)“… The most crucial and fundamental challenge that WSN is facing is security. The primary subject of all my work is to address this issue …”
Volltext
Paper -
10
Prospects for Legal Regulation of Quantum Communication
ISSN: 2409-9058, 2412-2343Veröffentlicht: Publshing House V.Ема 01.01.2024Veröffentlicht in BRICS law journal (01.01.2024)“… of cryptography algorithms. In this article, this new digital technology includes quantum key distribution and encryption methods that are cryptographically resistant to a quantum computer …”
Volltext
Journal Article -
11
IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS
ISSN: 2522-9818, 2524-2296Veröffentlicht: 30.09.2022Veröffentlicht in Sučasnij stan naukovih doslìdženʹ ta tehnologìj v promislovostì (Online) (30.09.2022)“… The subject of the study are features of the implementation of a generalized method of synthesis groups of symmetric two-operand operations of cryptographic coding information for "lightweight cryptography …”
Volltext
Journal Article -
12
IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS
ISSN: 2522-9818, 2524-2296Veröffentlicht: Kharkiv National University of Radio Electronics 01.06.2022Veröffentlicht in Sučasnij stan naukovih doslìdženʹ ta tehnologìj v promislovostì (Online) (01.06.2022)“… The subject of the study are features of the implementation of a generalized method of synthesis groups of symmetric two-operand operations of cryptographic coding information for "lightweight cryptography …”
Volltext
Journal Article -
13
Research and Implementation of MQTT Security Mechanism Based on Domestic CryptographicAlgorithms
ISSN: 1002-137XVeröffentlicht: Editorial office of Computer Science 01.02.2024Veröffentlicht in Ji suan ji ke xue (01.02.2024)“… Aiming at the problem that existing MQTT protocol lacks effective identity authentication and data plaintext transmission,an MQTT security protection scheme is designed based on domestic cryptography …”
Volltext
Journal Article -
14
Research and Implementation of MQTT Security Mechanism Based on Domestic Cryptographic Algorithms
ISSN: 1002-137XVeröffentlicht: Chongqing Guojia Kexue Jishu Bu 01.02.2024Veröffentlicht in Ji suan ji ke xue (01.02.2024)“… Aiming at the problem that existing MQTT protocol lacks effective identity authentication and data plaintext transmission, an MQTT security protection scheme is designed based on domestic cryptography …”
Volltext
Journal Article -
15
基于国密算法的MQTT安全机制研究与实现
ISSN: 1002-137XVeröffentlicht: 哈尔滨工程大学计算机科学与技术学院 哈尔滨 150001 15.02.2024Veröffentlicht in 计算机科学 (15.02.2024)“… TP309.2; 针对现有MQTT协议缺乏有效身份认证以及数据以明文形式传输的问题,提出了一种基于国密算法SM2,SM3,SM4的MQTT安全保护方案.通过SM2算法实现客户端与MQTT Broker之 …”
Volltext
Journal Article -
16
Introducing Cryptographic and Sorting Algorithms to Primary School Students and its Effect in the Classroom
ISSN: 2165-9567Veröffentlicht: IEEE 08.05.2024Veröffentlicht in IEEE Global Engineering Education Conference (08.05.2024)“… algorithms, as well as the effect of these activities to the students' eagerness to engage with other computer science-related subjects …”
Volltext
Tagungsbericht -
17
Energy-efficient Hardening of the SEDIMENT Methodology for Scalable IoT Network Security
Veröffentlicht: IEEE 02.09.2024Veröffentlicht in 2024 IEEE International Conference on Cyber Security and Resilience (CSR) (02.09.2024)“… : root of trust, remote attestation and end-to-end-secure publish-subscribe, while using resource-efficient cryptography algorithms and support of zero-trust principles …”
Volltext
Tagungsbericht -
18
Prime number generation using memetic programming
ISSN: 1433-5298, 1614-7456Veröffentlicht: Japan Springer Japan 01.06.2011Veröffentlicht in Artificial life and robotics (01.06.2011)“… , public key cryptography algorithms, hash tables, and pseudo-random number generators. One of the most popular topics to attract attention is to find a formula that maps the set of natural numbers into the set of prime numbers …”
Volltext
Journal Article -
19
AN INTEGRATED APPROACH TO DATA CONFIDENTIALITY IN 5G/6G BASED ON LDPC CODES AND POST-QUANTUM CRYPTOGRAPHY
ISSN: 3083-6298, 3083-6328Veröffentlicht: 26.09.2025Veröffentlicht in Terra security (26.09.2025)“… Methods and models of data secrecy in 5G/6G mobile networks based on LDPC codes integrated with post-quantum cryptography algorithms, as well as the principles of their combination …”
Volltext
Journal Article -
20
Hifn's Latest Security Processor Yields Lowest Cost-Per-Transaction For E-Commerce Servers
Veröffentlicht: New York PR Newswire Association LLC 05.09.2001Veröffentlicht in PR Newswire (05.09.2001)“… These forward-looking statements are subject to the risks set forth below and actual results could vary …”
Volltext
Newsletter

