Search
Search Results
-
Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard
The industrial internet of things (IIoT) refers to a system of interconnected equipment, sensors, and devices deployed within industrial environments...
-
Modified Elephant Herd Optimization-Based Advanced Encryption Standard
Cryptography is commonly employed to ensure secure data transfer via unsecure communication networks. With the rising need for picture transmission... -
An Advanced Encryption Standard in Memory (AESIM) Efficient, High Performance S-box Based AES Encryption and Decryption Architecture on VLSI
As CMOS(Complementary Metal Oxide Semiconductor) technology reaches its scaling threshold, evolving non-volatile memory approaches are becoming a...
-
An Effective Software Based Method to Analyze SCA Countermeasures for Advanced Encryption Standard
As everyone is aware that all the recently introduced networks systems are in need of significant security measures and by having a separate hardware...
-
Multi Socket Transmission System Application with Advanced Encryption Standard Algorithm to Support Confidential Medical Data Security
Medical data information plays an important role in supporting the confidentiality of diagnosis data, treatment, patient health history, examination... -
An ECG Signal Encryption and Classification Utilizing Advanced Encryption Standard and Support Vector Machine
Encryption has sparked interest in privacy concerns in health care, with a growing demand for privacy-preserving data collecting methods that keep... -
Advanced hybrid color image encryption utilizing novel chaotic neural network and 5D-hyperchaotic system
This paper introduces a new image encryption technique, leveraging the combined effects of a chaotic neural network and a 5D-Hyperchaotic system...
-
Advanced Encryption Standard-Based Encryption for Secured Transmission of Data in Cognitive Radio with Multi-channels
CRN is hyped as a powerful tool for advancing 5G networks that can significantly increase SE by allowing unlicensed users to access the inactive... -
Affine Recurrence Based Key Scheduling Algorithm for the Advanced Encryption Standard
Encryption algorithms such as Advanced Encryption Standard (AES) are known as symmetric encryption algorithms which use the same key for both... -
Design and Implementation of Advanced Encryption Standard Using Verilog HDL
Encryption plays an important role in data security against third-party attacks and it is significant to safeguard sensitive data and personal... -
Analysis on Advanced Encryption Standard with Different Image Steganography Algorithms: An Experimental Study
In this ever-changing world of technology, data security is of utmost importance. This research paper focuses on identifying the best combination of... -
Novel image encryption algorithm using hybrid 3D-ICPCM and hessenberg decomposition
This study introduces a novel image encryption algorithm by combining the capabilities of a three-dimensional chaotic map (3D-ICPCM) and Hessenberg...
-
256-Bit AES Encryption Using SubBytes Blocks Optimisation
Most applications, like e-commerce, military etc., place a significant emphasis on hardware security. Hash functions, public (asymmetric) key... -
A new self-embedding digital watermarking encryption scheme
For image information transmission security and copyright disputes, a novel and effective digital image watermarking encryption scheme is designed by...
-
Network Information Security Data Protection Based on Data Encryption Technology
Data encryption technology can protect data from illegal theft. This study analyzed the Rivest, Shamir, and Adleman (RSA) algorithm, the Advanced...
-
An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques
Effective communication between smart transportation and smart vehicles is carried out using Vehicular Ad-Hoc Networks (VANETs). Here, the VANET...
-
A secure and adaptive block-based image encryption: a novel high-speed approach
In the era of digital communication, ensuring the security of transmitted images is paramount, particularly for online and real-time applications...
-
Multilevel Modulated Chaotic Encryption and Belief Propagation Decoding
AbstractDue to the increasing channel capacity of multiple input multiple output (MIMO) systems, we herein propose a multilevel modulated chaotic...
-
Big data security and privacy protection model based on image encryption algorithm
The popularity of machine learning, AI and the network has greatly facilitated life, but there are also many security risks, and users’ privacy data...
-
A hybrid encryption approach for efficient and secure data transmission in IoT devices
Security is a crucial concern in the Internet of Things (IoT) ecosystem. Due to IoT devices' constrained processing and storage resources, providing...