We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 6,788 results
  1. Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard

    The industrial internet of things (IIoT) refers to a system of interconnected equipment, sensors, and devices deployed within industrial environments...

    Hosakota Vamshi Krishna, Krovi Raja Sekhar in Soft Computing
    Article 12 January 2024
  2. Modified Elephant Herd Optimization-Based Advanced Encryption Standard

    Cryptography is commonly employed to ensure secure data transfer via unsecure communication networks. With the rising need for picture transmission...
    R. Surendiran, S. Chellam, ... J. Sathiamoorthy in Intelligent Data Engineering and Analytics
    Conference paper 2023
  3. An Advanced Encryption Standard in Memory (AESIM) Efficient, High Performance S-box Based AES Encryption and Decryption Architecture on VLSI

    As CMOS(Complementary Metal Oxide Semiconductor) technology reaches its scaling threshold, evolving non-volatile memory approaches are becoming a...

    R. Anusha Padmavathi, K. S. Dhanalakshmi in Wireless Personal Communications
    Article 29 October 2021
  4. An Effective Software Based Method to Analyze SCA Countermeasures for Advanced Encryption Standard

    As everyone is aware that all the recently introduced networks systems are in need of significant security measures and by having a separate hardware...

    T. Manoj Kumar, P. Karthigaikumar in Wireless Personal Communications
    Article 15 December 2021
  5. Multi Socket Transmission System Application with Advanced Encryption Standard Algorithm to Support Confidential Medical Data Security

    Medical data information plays an important role in supporting the confidentiality of diagnosis data, treatment, patient health history, examination...
    Conference paper 2024
  6. An ECG Signal Encryption and Classification Utilizing Advanced Encryption Standard and Support Vector Machine

    Encryption has sparked interest in privacy concerns in health care, with a growing demand for privacy-preserving data collecting methods that keep...
    S. Sumathi, A. Balaji Ganesh in Soft Computing for Security Applications
    Conference paper 2023
  7. Advanced hybrid color image encryption utilizing novel chaotic neural network and 5D-hyperchaotic system

    This paper introduces a new image encryption technique, leveraging the combined effects of a chaotic neural network and a 5D-Hyperchaotic system...

    Subhashish Pal, Jaya Mukhopadhyay, ... Mrinal Kanti Mandal in Evolutionary Intelligence
    Article 25 March 2024
  8. Advanced Encryption Standard-Based Encryption for Secured Transmission of Data in Cognitive Radio with Multi-channels

    CRN is hyped as a powerful tool for advancing 5G networks that can significantly increase SE by allowing unlicensed users to access the inactive...
    Kiran P. More, Rajendrakumar A. Patil in Inventive Systems and Control
    Conference paper 2023
  9. Affine Recurrence Based Key Scheduling Algorithm for the Advanced Encryption Standard

    Encryption algorithms such as Advanced Encryption Standard (AES) are known as symmetric encryption algorithms which use the same key for both...
    S. Shashankh, Tavishi Kaushik, ... C. R. Kavitha in Computer Networks and Inventive Communication Technologies
    Conference paper 2022
  10. Design and Implementation of Advanced Encryption Standard Using Verilog HDL

    Encryption plays an important role in data security against third-party attacks and it is significant to safeguard sensitive data and personal...
    Shamsiah Binti Suhaili, Rene Brooke Fredrick, ... Norhuzaimin Julai in Proceedings of the 12th National Technical Seminar on Unmanned System Technology 2020
    Conference paper 2022
  11. Analysis on Advanced Encryption Standard with Different Image Steganography Algorithms: An Experimental Study

    In this ever-changing world of technology, data security is of utmost importance. This research paper focuses on identifying the best combination of...
    Alicia Biju, Lavina Kunder, J. Angel Arul Jothi in Congress on Intelligent Systems
    Conference paper 2022
  12. Novel image encryption algorithm using hybrid 3D-ICPCM and hessenberg decomposition

    This study introduces a novel image encryption algorithm by combining the capabilities of a three-dimensional chaotic map (3D-ICPCM) and Hessenberg...

    Vivek Verma, Sanjeev Kumar, Narbda Rani in Nonlinear Dynamics
    Article 30 April 2024
  13. 256-Bit AES Encryption Using SubBytes Blocks Optimisation

    Most applications, like e-commerce, military etc., place a significant emphasis on hardware security. Hash functions, public (asymmetric) key...
    R. Kishor Kumar, M. H. Yogesh, ... S. Sabareesh in Computational Intelligence in Machine Learning
    Conference paper 2024
  14. A new self-embedding digital watermarking encryption scheme

    For image information transmission security and copyright disputes, a novel and effective digital image watermarking encryption scheme is designed by...

    Linian Wang, Santo Banerjee, ... Bo Sun in Nonlinear Dynamics
    Article 06 April 2024
  15. Network Information Security Data Protection Based on Data Encryption Technology

    Data encryption technology can protect data from illegal theft. This study analyzed the Rivest, Shamir, and Adleman (RSA) algorithm, the Advanced...

    Article 22 June 2022
  16. An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques

    Effective communication between smart transportation and smart vehicles is carried out using Vehicular Ad-Hoc Networks (VANETs). Here, the VANET...

    M. S. Minu, P. Jona Innisai Rani, ... A. Rajesh in Peer-to-Peer Networking and Applications
    Article 18 April 2024
  17. A secure and adaptive block-based image encryption: a novel high-speed approach

    In the era of digital communication, ensuring the security of transmitted images is paramount, particularly for online and real-time applications...

    Sajid Khan, Hao Peng in Nonlinear Dynamics
    Article 25 June 2024
  18. Multilevel Modulated Chaotic Encryption and Belief Propagation Decoding

    Abstract

    Due to the increasing channel capacity of multiple input multiple output (MIMO) systems, we herein propose a multilevel modulated chaotic...

    Article 01 April 2023
  19. Big data security and privacy protection model based on image encryption algorithm

    The popularity of machine learning, AI and the network has greatly facilitated life, but there are also many security risks, and users’ privacy data...

    Binjie Hua, Zhe Wang, ... RuiLi Qi in Soft Computing
    Article 07 June 2023
  20. A hybrid encryption approach for efficient and secure data transmission in IoT devices

    Security is a crucial concern in the Internet of Things (IoT) ecosystem. Due to IoT devices' constrained processing and storage resources, providing...

    Article Open access 20 June 2024
Did you find what you were looking for? Share feedback.