Suchergebnisse - "encryption/decryption algorithms"

Andere Suchmöglichkeiten:

  1. 1

    Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism von Liu, Jinliang, Deng, Ying, Zha, Lijuan, Xie, Xiangpeng, Tian, Engang

    ISSN: 1049-8923, 1099-1239
    Veröffentlicht: Bognor Regis Wiley Subscription Services, Inc 10.05.2024
    “… The article concentrates on exploring the issue of privacy‐preserving sliding mode consensus of multi‐agent systems (MASs) with disturbance. An encryption and …”
    Volltext
    Journal Article
  2. 2

    Study on Various Encryption/Decryption Algorithms for Secure Communication using Chaotic based Hashed Key von Meera, K., Selvaganesan, N.

    Veröffentlicht: IEEE 18.12.2023
    Veröffentlicht in 2023 Ninth Indian Control Conference (ICC) (18.12.2023)
    “… In this paper, chaotic signal based hashed key generation for various encryption/decryption algorithms is investigated …”
    Volltext
    Tagungsbericht
  3. 3

    Quantum Key Distribution: Simulation and Characterizations von Jasim, Omer K., Abbas, Safia, El-Horbaty, El-Sayed M., Salem, Abdel-Badeeh M.

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2015
    Veröffentlicht in Procedia computer science (2015)
    “… All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are …”
    Volltext
    Journal Article
  4. 4

    Performance evaluation of three encryption/decryption algorithms von Kofahi, N.A., Turki Al-Somani, Khalid Al-Zamil

    ISBN: 0780382943, 9780780382947
    ISSN: 1548-3746
    Veröffentlicht: IEEE 2003
    “… This paper presents an implementation of three encryption algorithms and a comparison between them based on CPU execution time. The CPU execution time is …”
    Volltext
    Tagungsbericht
  5. 5

    OpenCL and CUDA software implementations of encryption/decryption algorithms for IPsec VPNs von Heinemann, Colleen, Byerly, Adam, Chaduvu, Sai Shankar, Uskov, Alexander

    ISSN: 2154-0373
    Veröffentlicht: IEEE 01.05.2016
    “… This paper presents the outcomes of a research project focused on the development and performance analysis of encryption/decryption algorithms in various modes of operation using OpenCL and CUDA development platforms …”
    Volltext
    Tagungsbericht Journal Article
  6. 6

    Bipartite Secure Consensus Control for Nonlinear Multi-agent Systems von Zheng, Shaobo, Zhou, Lei

    ISSN: 1948-9447
    Veröffentlicht: IEEE 25.05.2024
    Veröffentlicht in Chinese Control and Decision Conference (25.05.2024)
    “… ) with encryption-decryption algorithms (EDAs). Initially, the interaction dynamics between agents are portrayed through a signed digraph topology, wherein the edges encompass positive and negative connection weights …”
    Volltext
    Tagungsbericht
  7. 7
  8. 8
  9. 9

    QR code-based ECG signal encryption/decryption algorithm von Mathivanan, P., Ganesh, A. Balaji, Venkatesan, R.

    ISSN: 0161-1194, 1558-1586
    Veröffentlicht: West Point Taylor & Francis 04.05.2019
    Veröffentlicht in Cryptologia (04.05.2019)
    “… The paper presents a novel and enhanced bio-signal (ECG) cryptographic technique in which a QR code has been successfully utilized as a data container. The …”
    Volltext
    Journal Article
  10. 10

    A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication von Noor, Noor Sattar, Hammood, Dalal Abdulmohsin, Al-Naji, Ali, Chahl, Javaan

    ISSN: 2073-431X, 2073-431X
    Veröffentlicht: Basel MDPI AG 01.03.2022
    Veröffentlicht in Computers (Basel) (01.03.2022)
    “… Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user …”
    Volltext
    Journal Article
  11. 11

    RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission von Guptha, M. N. Sharada, Eshwarappa, M. N.

    ISSN: 0929-6212, 1572-834X
    Veröffentlicht: New York Springer US 01.07.2022
    Veröffentlicht in Wireless personal communications (01.07.2022)
    “… Security is an essential task while focusing on confidential level of patient information during medical data transmission. The image encryption algorithms …”
    Volltext
    Journal Article
  12. 12
  13. 13

    Image based Steganography in Cryptography implementing different Encryption-Decryption Algorithm von Dutta, Pinky Saikia, Chakraborty, Sauvik

    ISSN: 2456-3307, 2456-3307
    Veröffentlicht: 20.07.2020
    “… Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which …”
    Volltext
    Journal Article
  14. 14

    10 Clock-Periods Pipelined Implementation of AES-128 Encryption-Decryption Algorithm up to 28 Gbit/s Real Throughput by Xilinx Zynq UltraScale+ MPSoC ZCU102 Platform von Visconti, Paolo, Capoccia, Stefano, Venere, Eugenio, Velázquez, Ramiro, Fazio, Roberto de

    ISSN: 2079-9292, 2079-9292
    Veröffentlicht: Basel MDPI AG 01.10.2020
    Veröffentlicht in Electronics (Basel) (01.10.2020)
    “… The security of communication and computer systems is an increasingly important issue, nowadays pervading all areas of human activity (e.g., credit cards, …”
    Volltext
    Journal Article
  15. 15

    Real-Time Encryption/Decryption Algorithm with A Fractional Chaotic System of Various Data: Image, Speech, and Text von Ataş, Muhammet Taha, Güler, Hasan

    ISSN: 2349-5103, 2199-5796
    Veröffentlicht: New Delhi Springer India 01.08.2022
    “… Nowadays, a fractional-order chaotic system is commonly used in digital cryptosystem applications due to its precision to initial conditions and their …”
    Volltext
    Journal Article
  16. 16

    A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography von Rathore, Manjari Singh, Poongodi, M., Saurabh, Praneet, Lilhore, Umesh Kumar, Bourouis, Sami, Alhakami, Wajdi, Osamor, Jude, Hamdi, Mounir

    ISSN: 0045-7906, 1879-0755
    Veröffentlicht: Elsevier Ltd 01.09.2022
    Veröffentlicht in Computers & electrical engineering (01.09.2022)
    “… •This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method …”
    Volltext
    Journal Article
  17. 17

    Event-based privacy-consensus control for multiagent systems: An enhanced framework for fault-tolerance and protection against eavesdropping von Hu, Xiaoyan, Ye, Dan

    ISSN: 0096-3003
    Veröffentlicht: Elsevier Inc 01.09.2025
    Veröffentlicht in Applied mathematics and computation (01.09.2025)
    “… This paper investigates the consensus problem of privacy protection for multi-agent systems (MASs) under conditions of compound faults. We develop a …”
    Volltext
    Journal Article
  18. 18

    VLSI Implementation of RSA Encryption/Decryption Algorithm von R, Rasu, ., Manoshrudhy, Shanmugasundaram, P.

    ISSN: 2347-2227, 2347-6141
    Veröffentlicht: Nagercoil iManager Publications 15.05.2014
    Veröffentlicht in I-Manager's Journal on Computer Science (15.05.2014)
    “… The RSA system is widely employed in networking applications for good performance and high security. It supports the multiple key sizes like 128 bits, 256 …”
    Volltext
    Journal Article
  19. 19

    Algebraic Coding Theory Using Pell Equation x2 − 8y2 = 1 von Janaki, G, Gowri, Shankari A

    ISSN: 1592-7415, 2282-8214
    Veröffentlicht: Pescara Accademia Piceno Aprutina dei Velati in Teramo (APAV) 01.03.2023
    Veröffentlicht in Ratio mathematica (01.03.2023)
    “… An interdisciplinary field with significant practical use is cryptography. The difficulty of specific mathematical computing tasks affects a public key …”
    Volltext
    Journal Article
  20. 20

    Design of Event-Triggered Secure Containment Controllers for Multi-Agent Systems over Signed Graphs von Zheng, Shaobo, Zhou, Lei

    ISSN: 0278-081X, 1531-5878
    Veröffentlicht: New York Springer US 01.06.2025
    Veröffentlicht in Circuits, systems, and signal processing (01.06.2025)
    “… On one hand, an encryption-decryption algorithm is proposed to improve data security and reliability …”
    Volltext
    Journal Article