Výsledky vyhledávání - "encryption and decryption algorithm"

  • Zobrazuji výsledky 1 - 17 z 17
Upřesnit hledání
  1. 1

    Encryption and decryption algorithm based on the Latin groupoid isotopes Autor Chiriac, Liubomir, Danilov, Aurel, Bogdanova, Violeta

    ISSN: 2537-6284, 2587-3644
    Vydáno: "Ion Creanga" State Pedagogical University 01.09.2023
    “…This paper studies encryption and decryption algorithm, using isotopes of Latin groupoid. Cryptographic algorithms are computationally intensive processes…”
    Získat plný text
    Journal Article
  2. 2

    A plaintext-related image encryption algorithm based on chaos Autor Zhang, Yong, Tang, Yingjun

    ISSN: 1380-7501, 1573-7721
    Vydáno: New York Springer US 01.03.2018
    Vydáno v Multimedia tools and applications (01.03.2018)
    “…A symmetric key image cryptosystem based on the piecewise linear map is presented in this paper. In this cryptosystem, the encryption process and the…”
    Získat plný text
    Journal Article
  3. 3

    An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map Autor Abdelfatah, Roayat Ismail, Saqr, Hager Mohamed, Nasr, Mohamed E.

    ISSN: 1380-7501, 1573-7721
    Vydáno: New York Springer US 01.06.2023
    Vydáno v Multimedia tools and applications (01.06.2023)
    “…A Wireless Body Area Network (WBAN) is a network of wireless sensor nodes that can be installed inside or outside of the human body. This network is crucial in…”
    Získat plný text
    Journal Article
  4. 4

    FPGA Accelerator for 3DES Algorithm Based on OpenCL Autor WU Jianfeng, ZHENG Bowen, NIE Yi, CHAI Zhilei

    ISSN: 1000-3428
    Vydáno: Editorial Office of Computer Engineering 01.12.2021
    Vydáno v Ji suan ji gong cheng (01.12.2021)
    “…Nowadays, encryption and decryption algorithms are widely used in digital currency, blockchain, cloud data encryption and other fields.Traditional…”
    Získat plný text
    Journal Article
  5. 5

    A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm Autor Cai, Wentian, Yao, Huijun

    ISSN: 0929-6212, 1572-834X
    Vydáno: New York Springer US 01.11.2022
    Vydáno v Wireless personal communications (01.11.2022)
    “…In order to solve the problems of low transmission efficiency and high transmission bit error rate in traditional transmission methods, a new secure…”
    Získat plný text
    Journal Article
  6. 6
  7. 7
  8. 8

    Cryptography and Adversarial Analysis for Cloud Data Security Autor Manjula, S., Valarmathi, K., Sudha, M.Swarna

    Vydáno: IEEE 15.03.2024
    “…Cloud computing, a novel paradigm for distributed data processing, has emerged as a transformative technology enabling the storage and retrieval of data over…”
    Získat plný text
    Konferenční příspěvek
  9. 9

    Power Data Collection Terminal Protection Based On SM9 Autor Piao, Liu, NuanQiang, Ye, HanXian, Han, Man, Luo Jin, ShuFeng, Yang, RuiJue, Feng, MengZhen, Song

    ISSN: 2642-6226
    Vydáno: IEEE 08.12.2021
    “…With the proposal of the development plan of the Power and Internet of things, the power data collection terminal has received strong attention. However, due…”
    Získat plný text
    Konferenční příspěvek
  10. 10

    Performance Test and Analysis of National Secret Algorithm SM2 in Power Data Protection Autor Li, Xuandong, Li, Zhifeng, Zeng, Xianyu, Yang, Shufeng, Liang, Haoran, Chen, Ziqiu

    Vydáno: IEEE 22.10.2021
    “…Power data contains a wealth of privacy information. Data protection has always been an urgent problem to pay attention to. Domestic cryptographic algorithm is…”
    Získat plný text
    Konferenční příspěvek
  11. 11

    Analysis of the influence of CAN bus encryption and decryption on real time performance Autor Chong, Tonghong, Liu, Tianyu, Zhang, Yanan, Ma, Chao, Jia, Xianfeng, Wu, Zhi

    Vydáno: IEEE 01.07.2021
    “…With the rapid development of intelligent network connected vehicle, information security has been paid more and more attention. In order to solve the problem…”
    Získat plný text
    Konferenční příspěvek
  12. 12

    Building a Secure Decentralized Energy System with Remote Monitoring Using Mobile Agents Autor Eldegwi, H. M., Badawy, M. B., Kelash, Hamdy M.

    Vydáno: IEEE 01.10.2015
    “…Centralized systems have failed in remote rural areas due to weak infrastructures, roads between urban habitations are in a very bad condition even if found,…”
    Získat plný text
    Konferenční příspěvek
  13. 13

    Applying decentralized approach based on mobile agent for improving e-transaction system Autor El-degwy, Hossam, Kelash, Hamdy M., Faragallah, Osama S.

    ISBN: 9781467355650, 1467355658
    Vydáno: IEEE 01.12.2012
    “…In this paper, we propose a solution which can not only satisfy security demands like confidentiality and integrity for data carried during e-transaction, but…”
    Získat plný text
    Konferenční příspěvek
  14. 14

    Two Improved Algorithms Based on Character Encryption and Decryption Autor Ze-mao Zhao, Meng-ting Li

    ISBN: 1424482313, 9781424482313
    Vydáno: IEEE 01.07.2010
    “…To improve the weakness that the same plaintext strings have the same ciphertext strings in character encryption and decryption scheme based on a shift…”
    Získat plný text
    Konferenční příspěvek
  15. 15

    Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations Autor Zhou, Ri-Gui, Wu, Qian, Zhang, Man-Qun, Shen, Chen-Yi

    ISSN: 0020-7748, 1572-9575
    Vydáno: Boston Springer US 01.06.2013
    “…Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the…”
    Získat plný text
    Journal Article
  16. 16

    Speed Up Image Encryption by Using RSA Algorithm Autor Al-Kadei, Faten H. Mohammed Sediq, Mardan, Huda Abdalkaream, Minas, Nevart A.

    ISBN: 1728151961, 9781728151960
    ISSN: 2575-7288
    Vydáno: IEEE 01.03.2020
    “…Since the existing RSA Algorithm needs long key sizes, requires big memory spaces and also a long execution time, it seems necessary to make some changes or…”
    Získat plný text
    Konferenční příspěvek
  17. 17

    Three Diamentional Object Used for Data Security Autor Mhaske-Dhamdhere, V, Patil, G A

    ISBN: 142448653X, 9781424486533
    Vydáno: IEEE 01.11.2010
    “…Current authentication systems suffer from many weaknesses. Textual passwords are commonly used, however, users do not follow their requirements. Users tend to…”
    Získat plný text
    Konferenční příspěvek