Výsledky vyhledávání - "encryption and decryption algorithm"
-
1
Encryption and decryption algorithm based on the Latin groupoid isotopes
ISSN: 2537-6284, 2587-3644Vydáno: "Ion Creanga" State Pedagogical University 01.09.2023Vydáno v Acta et Commentationes: Ştiinţe Exacte şi ale Naturii (01.09.2023)“…This paper studies encryption and decryption algorithm, using isotopes of Latin groupoid. Cryptographic algorithms are computationally intensive processes…”
Získat plný text
Journal Article -
2
A plaintext-related image encryption algorithm based on chaos
ISSN: 1380-7501, 1573-7721Vydáno: New York Springer US 01.03.2018Vydáno v Multimedia tools and applications (01.03.2018)“…A symmetric key image cryptosystem based on the piecewise linear map is presented in this paper. In this cryptosystem, the encryption process and the…”
Získat plný text
Journal Article -
3
An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map
ISSN: 1380-7501, 1573-7721Vydáno: New York Springer US 01.06.2023Vydáno v Multimedia tools and applications (01.06.2023)“…A Wireless Body Area Network (WBAN) is a network of wireless sensor nodes that can be installed inside or outside of the human body. This network is crucial in…”
Získat plný text
Journal Article -
4
FPGA Accelerator for 3DES Algorithm Based on OpenCL
ISSN: 1000-3428Vydáno: Editorial Office of Computer Engineering 01.12.2021Vydáno v Ji suan ji gong cheng (01.12.2021)“…Nowadays, encryption and decryption algorithms are widely used in digital currency, blockchain, cloud data encryption and other fields.Traditional…”
Získat plný text
Journal Article -
5
A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm
ISSN: 0929-6212, 1572-834XVydáno: New York Springer US 01.11.2022Vydáno v Wireless personal communications (01.11.2022)“…In order to solve the problems of low transmission efficiency and high transmission bit error rate in traditional transmission methods, a new secure…”
Získat plný text
Journal Article -
6
Hardware Implementation of AES Encryption and Decryption System Based on FPGA
ISSN: 1874-110X, 1874-110XVydáno: 15.09.2015Vydáno v The open cybernetics & systemics journal (15.09.2015)Získat plný text
Journal Article -
7
Utilization of Mobile Agents for Building a Secure Decentralized Energy System with Remote Monitoring
ISSN: 2210-142XVydáno: 01.07.2016Vydáno v International Journal of Computing and Digital System (Jāmiʻat al-Baḥrayn. Markaz al-Nashr al-ʻIlmī) (01.07.2016)Získat plný text
Journal Article -
8
Cryptography and Adversarial Analysis for Cloud Data Security
Vydáno: IEEE 15.03.2024Vydáno v 2024 5th International Conference on Innovative Trends in Information Technology (ICITIIT) (15.03.2024)“…Cloud computing, a novel paradigm for distributed data processing, has emerged as a transformative technology enabling the storage and retrieval of data over…”
Získat plný text
Konferenční příspěvek -
9
Power Data Collection Terminal Protection Based On SM9
ISSN: 2642-6226Vydáno: IEEE 08.12.2021Vydáno v Proceedings (International Conference on Power System Technology. Online) (08.12.2021)“…With the proposal of the development plan of the Power and Internet of things, the power data collection terminal has received strong attention. However, due…”
Získat plný text
Konferenční příspěvek -
10
Performance Test and Analysis of National Secret Algorithm SM2 in Power Data Protection
Vydáno: IEEE 22.10.2021Vydáno v 2021 IEEE 5th Conference on Energy Internet and Energy System Integration (EI2) (22.10.2021)“…Power data contains a wealth of privacy information. Data protection has always been an urgent problem to pay attention to. Domestic cryptographic algorithm is…”
Získat plný text
Konferenční příspěvek -
11
Analysis of the influence of CAN bus encryption and decryption on real time performance
Vydáno: IEEE 01.07.2021Vydáno v 2021 2nd International Conference on Computer Communication and Network Security (CCNS) (01.07.2021)“…With the rapid development of intelligent network connected vehicle, information security has been paid more and more attention. In order to solve the problem…”
Získat plný text
Konferenční příspěvek -
12
Building a Secure Decentralized Energy System with Remote Monitoring Using Mobile Agents
Vydáno: IEEE 01.10.2015Vydáno v 2015 Fifth International Conference on e-Learning (econf) (01.10.2015)“…Centralized systems have failed in remote rural areas due to weak infrastructures, roads between urban habitations are in a very bad condition even if found,…”
Získat plný text
Konferenční příspěvek -
13
Applying decentralized approach based on mobile agent for improving e-transaction system
ISBN: 9781467355650, 1467355658Vydáno: IEEE 01.12.2012Vydáno v 2012 8th International Computer Engineering Conference (ICENCO) (01.12.2012)“…In this paper, we propose a solution which can not only satisfy security demands like confidentiality and integrity for data carried during e-transaction, but…”
Získat plný text
Konferenční příspěvek -
14
Two Improved Algorithms Based on Character Encryption and Decryption
ISBN: 1424482313, 9781424482313Vydáno: IEEE 01.07.2010Vydáno v 2010 Third International Symposiums on Electronic Commerce and Security (01.07.2010)“…To improve the weakness that the same plaintext strings have the same ciphertext strings in character encryption and decryption scheme based on a shift…”
Získat plný text
Konferenční příspěvek -
15
Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations
ISSN: 0020-7748, 1572-9575Vydáno: Boston Springer US 01.06.2013Vydáno v International journal of theoretical physics (01.06.2013)“…Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the…”
Získat plný text
Journal Article -
16
Speed Up Image Encryption by Using RSA Algorithm
ISBN: 1728151961, 9781728151960ISSN: 2575-7288Vydáno: IEEE 01.03.2020Vydáno v International Conference on Advanced Computing and Communication Systems (Online) (01.03.2020)“…Since the existing RSA Algorithm needs long key sizes, requires big memory spaces and also a long execution time, it seems necessary to make some changes or…”
Získat plný text
Konferenční příspěvek -
17
Three Diamentional Object Used for Data Security
ISBN: 142448653X, 9781424486533Vydáno: IEEE 01.11.2010Vydáno v 2010 International Conference on Computational Intelligence and Communication Networks (01.11.2010)“…Current authentication systems suffer from many weaknesses. Textual passwords are commonly used, however, users do not follow their requirements. Users tend to…”
Získat plný text
Konferenční příspěvek

