Results 11 to 20 of about 62,040 (316)
A Fuzzy Hypergraph-Based Framework for Secure Encryption and Decryption of Sensitive Messages [PDF]
The growing sophistication of cyber-attacks demands encryption processes that go beyond the confines of conventional cryptographic methods. Traditional cryptographic systems based on numerical algorithms or standard graph theory are still open to ...
A. Meenakshi +4 more
openalex +3 more sources
Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance [PDF]
Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to
Santi Pattanavichai
doaj +1 more source
Crypto Model of Real-Time Audio Streaming Across Paired Mobile Devices [PDF]
The progressive usage of the Internet of Things (IoT) and smartphone ubiquity is inducing attention, importance and interest in leveraging smartphones for deploying and running sophisticated mobile applications. Modern smartphones have good connectivity,
E. Ibam, O. Boyinbode, I. Ayelabowo
doaj +1 more source
Image Encryption Using Block Cipher Based Serpent Algorithm [PDF]
In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating cipher textthat can only be read if decrypted.A proposal algorithm forimages protectionis depending on the block cipher ...
Yossra Hussain Ali +1 more
doaj +1 more source
Chaotic-Map Based Encryption for 3D Point and 3D Mesh Fog Data in Edge Computing
Recent decades have seen dramatic development and adoption of digital technology. This technological advancement generates a large amount of critical data that must be safeguarded.
K. R. Raghunandan +4 more
doaj +1 more source
Proposed Hybrid Approach of Stream Cipher base on Selector of Encryption operation and Key Symmetric translate [PDF]
A stream cipher is a method of encrypting text (to produce cipher text) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time. This method is not much used in modern cryptography.
Alaa Kadim Farhan
doaj +1 more source
A Concealed Based Approach for Secure Transmission in Advanced Metering Infrastructure
The smart grid has an important subsystem known as the Advanced Metering Infrastructure (AMI), responsible for measuring customer consumption of electricity.
Otisitswe Kebotogetse +2 more
doaj +1 more source
Single image encryption schemes are not efficient enough when a bunch of images is to be encrypted in some real-world setting. To overcome this problem, an efficient and secured multiple images encryption scheme is proposed in this study using two ...
Muhammad Hanif +4 more
doaj +1 more source
The security of powering systems has been a major problem over the last decade, leading to an increased interest in wireless power and data transfer. In this research paper, a new inductive Wireless Power Transfer (WPT) circuit topology has been used. In
Colin Sokol Kuka +4 more
doaj +1 more source
One of the most challenging parts of integrating biometrics and cryptography is the intra variation in acquired identifiers between the same users. Due to noise in the environment or different devices, features of the iris may differ when it is acquired ...
Sim Hiew Moi +6 more
doaj +1 more source

