Search Results - "encryption/decryption algorithms"
-
1
A Coding Algorithm using Super-edge Magic Total Labeling of Extended Duplicate Graphs
Published: IEEE 08.09.2022Published in 2022 Second International Conference on Computer Science, Engineering and Applications (ICCSEA) (08.09.2022)“… understands the message and others could not. Graph labeling is an assignment of labels (numbers) to vertices or edges or both subject to certain criteria…”
Get full text
Conference Proceeding -
2
Multi-Factor Analysis of RSA Based on Variations in Primes Used for Modulus Generation
Published: IEEE 08.09.2023Published in 2023 3rd International Conference on Innovative Sustainable Computational Technologies (CISCT) (08.09.2023)“…The RSA cryptosystem encompasses some of the most common and popular encryption-decryption algorithms…”
Get full text
Conference Proceeding -
3
Cryptographic Algorithm Based on Prime Assignment
ISSN: 2321-9653, 2321-9653Published: 31.01.2022Published in International journal for research in applied science and engineering technology (31.01.2022)“… This concept increases the security of the text. Keywords: Cryptography; encryption- decryption algorithms; Gaussian primes…”
Get full text
Journal Article -
4
Light-Weight Solution to Defend Implantable Medical Devices against Man-In-The-Middle Attack
ISSN: 2576-6813Published: IEEE 01.12.2018Published in 2018 IEEE Global Communications Conference (GLOBECOM) (01.12.2018)“…Nowadays, Implantable Medical Devices (IMDs) rely mainly on wireless technology for information exchange. In spite of the many advantages wireless technology…”
Get full text
Conference Proceeding