Results 31 to 40 of about 2,385 (165)

A Secure Chaos-Based Lightweight Cryptosystem for the Internet of Things

open access: yesIEEE Access, 2023
This paper introduces a novel approach to addressing the security challenges of the Internet of Things (IoT) by presenting a secure Chaos-based lightweight cryptosystem.
Wajih El Hadj Youssef   +8 more
doaj   +1 more source

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm

open access: yesIET Computers &Digital Techniques, Volume 2026, Issue 1, 2026.
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan   +6 more
wiley   +1 more source

SKE2SG: A Secure Key Establishment Scheme for Smart Grid Cyber‐Physical Systems Based on Elliptic Curve Cryptography

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley   +1 more source

A Comparative Study of Decision Tree, RNNs and CNNs for Detection of False Data Injection Attacks in Cyber‐Physical Power Systems

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Intrusion detection for FDIAs is proposed using three approaches. (1) a stack‐based model containing an expansion decision tree and neural network, (2) recurrent neural networks (RNNs) and (3) convolutional neural networks (CNNs). The first two methods are based on the initial preprocessing of row instances, whereas the last one involves the time ...
Zeeshan Haider   +3 more
wiley   +1 more source

Chinese Remainder Cryptosystem-Based Multilayer Perceptron Signcryption for Secure Vehicular Communication

open access: yesPromet (Zagreb)
Vehicular ad-hoc networks (VANETs) are significant network environments for communication between vehicles to efficiently address the issues concerning traffic safety, traffic management and circumventing congestion.
Jini KIZHAKKAYIL MEETHAL   +3 more
doaj   +1 more source

Design and parallel implementation on Artix-7 FPGA of the SIMON32/64 Cryptosystem

open access: yesVisión Electrónica, 2022
In the rise of digital transformation, information security is positioned in a prominent place because it provides confidence to society in the use of information technologies. For this reason, there is growing research in this area.
José Gabriel Rincón-González   +2 more
doaj  

Hyperchaos‐Driven 3D RGB Image Scrambling and Encryption for Multi‐Image Security

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
The proposed encryption scheme scrambles N colour images by stacking them into a three‐dimensional red, green, blue image, generating a secure 256‐bit key using SHA‐256 and a user‐provided salt, and applying a five‐dimensional multi‐wing hyperchaotic system to produce random key streams.
Muhammad Hanif   +6 more
wiley   +1 more source

RSA: A number of formulas to improve the search for p+qp+q

open access: yesJournal of Mathematical Cryptology, 2017
Breaking RSA is one of the fundamental problems in cryptography. Due to its reliance on the difficulty of the integer factorization problem, no efficient solution has been found despite decades of extensive research. One of the possible ways to break RSA
Mohammed Ahmed, Alkhelaifi Abdulrahman
doaj   +1 more source

A Novel Hybrid Image Encryption Scheme Using Henon Map for Secure Image Communication

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
The combination of chaos theory and cryptographic methodologies constitutes a pivotal aspect of the information security. Owing to certain attributes of images, like their large data capacity and significant redundancy, image encryption needs specialized techniques instead of conventional text encryption.
Saba Inam   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy