Výsledky vyhľadávania - "encryption–decryption algorithms"

  1. 1

    Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism Autor Liu, Jinliang, Deng, Ying, Zha, Lijuan, Xie, Xiangpeng, Tian, Engang

    ISSN: 1049-8923, 1099-1239
    Vydavateľské údaje: Bognor Regis Wiley Subscription Services, Inc 10.05.2024
    “…The article concentrates on exploring the issue of privacy‐preserving sliding mode consensus of multi‐agent systems (MASs) with disturbance. An encryption and…”
    Získať plný text
    Journal Article
  2. 2

    Study on Various Encryption/Decryption Algorithms for Secure Communication using Chaotic based Hashed Key Autor Meera, K., Selvaganesan, N.

    Vydavateľské údaje: IEEE 18.12.2023
    “…In this paper, chaotic signal based hashed key generation for various encryption/decryption algorithms is investigated…”
    Získať plný text
    Konferenčný príspevok..
  3. 3

    Quantum Key Distribution: Simulation and Characterizations Autor Jasim, Omer K., Abbas, Safia, El-Horbaty, El-Sayed M., Salem, Abdel-Badeeh M.

    ISSN: 1877-0509, 1877-0509
    Vydavateľské údaje: Elsevier B.V 2015
    Vydané v Procedia computer science (2015)
    “…All traditional cryptographic algorithms used in the network communication environments, relied on mathematical models and computational assumptions, are…”
    Získať plný text
    Journal Article
  4. 4

    Performance evaluation of three encryption/decryption algorithms Autor Kofahi, N.A., Turki Al-Somani, Khalid Al-Zamil

    ISBN: 0780382943, 9780780382947
    ISSN: 1548-3746
    Vydavateľské údaje: IEEE 2003
    “…This paper presents an implementation of three encryption algorithms and a comparison between them based on CPU execution time. The CPU execution time is…”
    Získať plný text
    Konferenčný príspevok..
  5. 5

    OpenCL and CUDA software implementations of encryption/decryption algorithms for IPsec VPNs Autor Heinemann, Colleen, Byerly, Adam, Chaduvu, Sai Shankar, Uskov, Alexander

    ISSN: 2154-0373
    Vydavateľské údaje: IEEE 01.05.2016
    “… This paper presents the outcomes of a research project focused on the development and performance analysis of encryption/decryption algorithms in various modes of operation using OpenCL and CUDA development platforms…”
    Získať plný text
    Konferenčný príspevok.. Journal Article
  6. 6

    Bipartite Secure Consensus Control for Nonlinear Multi-agent Systems Autor Zheng, Shaobo, Zhou, Lei

    ISSN: 1948-9447
    Vydavateľské údaje: IEEE 25.05.2024
    “…) with encryption-decryption algorithms (EDAs). Initially, the interaction dynamics between agents are portrayed through a signed digraph topology, wherein the edges encompass positive and negative connection weights…”
    Získať plný text
    Konferenčný príspevok..
  7. 7
  8. 8
  9. 9

    QR code-based ECG signal encryption/decryption algorithm Autor Mathivanan, P., Ganesh, A. Balaji, Venkatesan, R.

    ISSN: 0161-1194, 1558-1586
    Vydavateľské údaje: West Point Taylor & Francis 04.05.2019
    Vydané v Cryptologia (04.05.2019)
    “…The paper presents a novel and enhanced bio-signal (ECG) cryptographic technique in which a QR code has been successfully utilized as a data container. The…”
    Získať plný text
    Journal Article
  10. 10

    A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication Autor Noor, Noor Sattar, Hammood, Dalal Abdulmohsin, Al-Naji, Ali, Chahl, Javaan

    ISSN: 2073-431X, 2073-431X
    Vydavateľské údaje: Basel MDPI AG 01.03.2022
    Vydané v Computers (Basel) (01.03.2022)
    “…Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user…”
    Získať plný text
    Journal Article
  11. 11

    RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission Autor Guptha, M. N. Sharada, Eshwarappa, M. N.

    ISSN: 0929-6212, 1572-834X
    Vydavateľské údaje: New York Springer US 01.07.2022
    Vydané v Wireless personal communications (01.07.2022)
    “…Security is an essential task while focusing on confidential level of patient information during medical data transmission. The image encryption algorithms…”
    Získať plný text
    Journal Article
  12. 12
  13. 13

    Image based Steganography in Cryptography implementing different Encryption-Decryption Algorithm Autor Dutta, Pinky Saikia, Chakraborty, Sauvik

    ISSN: 2456-3307, 2456-3307
    Vydavateľské údaje: 20.07.2020
    “…Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which…”
    Získať plný text
    Journal Article
  14. 14

    10 Clock-Periods Pipelined Implementation of AES-128 Encryption-Decryption Algorithm up to 28 Gbit/s Real Throughput by Xilinx Zynq UltraScale+ MPSoC ZCU102 Platform Autor Visconti, Paolo, Capoccia, Stefano, Venere, Eugenio, Velázquez, Ramiro, Fazio, Roberto de

    ISSN: 2079-9292, 2079-9292
    Vydavateľské údaje: Basel MDPI AG 01.10.2020
    Vydané v Electronics (Basel) (01.10.2020)
    “…The security of communication and computer systems is an increasingly important issue, nowadays pervading all areas of human activity (e.g., credit cards,…”
    Získať plný text
    Journal Article
  15. 15

    Real-Time Encryption/Decryption Algorithm with A Fractional Chaotic System of Various Data: Image, Speech, and Text Autor Ataş, Muhammet Taha, Güler, Hasan

    ISSN: 2349-5103, 2199-5796
    Vydavateľské údaje: New Delhi Springer India 01.08.2022
    “…Nowadays, a fractional-order chaotic system is commonly used in digital cryptosystem applications due to its precision to initial conditions and their…”
    Získať plný text
    Journal Article
  16. 16

    A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography Autor Rathore, Manjari Singh, Poongodi, M., Saurabh, Praneet, Lilhore, Umesh Kumar, Bourouis, Sami, Alhakami, Wajdi, Osamor, Jude, Hamdi, Mounir

    ISSN: 0045-7906, 1879-0755
    Vydavateľské údaje: Elsevier Ltd 01.09.2022
    Vydané v Computers & electrical engineering (01.09.2022)
    “…•This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method…”
    Získať plný text
    Journal Article
  17. 17

    Event-based privacy-consensus control for multiagent systems: An enhanced framework for fault-tolerance and protection against eavesdropping Autor Hu, Xiaoyan, Ye, Dan

    ISSN: 0096-3003
    Vydavateľské údaje: Elsevier Inc 01.09.2025
    Vydané v Applied mathematics and computation (01.09.2025)
    “…This paper investigates the consensus problem of privacy protection for multi-agent systems (MASs) under conditions of compound faults. We develop a…”
    Získať plný text
    Journal Article
  18. 18

    VLSI Implementation of RSA Encryption/Decryption Algorithm Autor R, Rasu, ., Manoshrudhy, Shanmugasundaram, P.

    ISSN: 2347-2227, 2347-6141
    Vydavateľské údaje: Nagercoil iManager Publications 15.05.2014
    “…The RSA system is widely employed in networking applications for good performance and high security. It supports the multiple key sizes like 128 bits, 256…”
    Získať plný text
    Journal Article
  19. 19

    Algebraic Coding Theory Using Pell Equation x2 − 8y2 = 1 Autor Janaki, G, Gowri, Shankari A

    ISSN: 1592-7415, 2282-8214
    Vydavateľské údaje: Pescara Accademia Piceno Aprutina dei Velati in Teramo (APAV) 01.03.2023
    Vydané v Ratio mathematica (01.03.2023)
    “…An interdisciplinary field with significant practical use is cryptography. The difficulty of specific mathematical computing tasks affects a public key…”
    Získať plný text
    Journal Article
  20. 20

    Design of Event-Triggered Secure Containment Controllers for Multi-Agent Systems over Signed Graphs Autor Zheng, Shaobo, Zhou, Lei

    ISSN: 0278-081X, 1531-5878
    Vydavateľské údaje: New York Springer US 01.06.2025
    “… On one hand, an encryption-decryption algorithm is proposed to improve data security and reliability…”
    Získať plný text
    Journal Article