Applying the defense model to strengthen information security with artificial intelligence in computer networks of the financial services sector. [PDF]
Karn AL +7 more
europepmc +1 more source
A novel 2D MTMHM based key generation for enhanced security in medical image communication. [PDF]
Devi CS, Amirtharajan R.
europepmc +1 more source
Field-Programmable Gate Array-Based Implementation of Zero-Trust Stream Data Encryption for Enabling 6G-Narrowband Internet of Things Massive Device Access. [PDF]
Tsai WC.
europepmc +1 more source
An Iterative quantum chaotic security method design for big data deployments using a multi-model framework for key generation, threat modelling, and anomaly-resilient validation. [PDF]
Kotangale A, Kumar MS.
europepmc +1 more source
Robust and secure image steganography with recurrent neural network and fuzzy logic integration. [PDF]
Kanimozhi R, Padmavathi V.
europepmc +1 more source
Low power IoT device communication through hybrid AES-RSA encryption in MRA mode. [PDF]
Chang Q, Ma T, Yang W.
europepmc +1 more source
Vehicle-to-Vehicle Secure Communication Protocol Based on Digital Vehicle Identification Number. [PDF]
Escapa Gordón P +2 more
europepmc +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
Research on Variable Parameter Color Image Encryption Based on Five-Dimensional Tri-Valued Memristor Chaotic System. [PDF]
Wang P, Ding L.
europepmc +1 more source

