Results 31 to 40 of about 39,375 (295)
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein +2 more
doaj +1 more source
Ultralong room temperature phosphorescence is achieved from amorphous organic materials toward information encryption. Ultralong room temperature phosphorescence (URTP) emitted from pure amorphous organic molecules is very rare.
Yan Su +9 more
semanticscholar +1 more source
Analytical Study of Hybrid Techniques for Image Encryption and Decryption
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
C. L. Chowdhary +5 more
semanticscholar +1 more source
DeCrypt: a 3DES inspired optimised cryptographic algorithm
Triple Data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for authentication and encryption. However, as per a draft published by NIST in 2018, 3DES is officially being retired and not suggested to use for new applications.
Deepraj Chowdhury +6 more
openaire +2 more sources
This paper proposes an innovative fusion of encryption and compression techniques that optimizes data handling and security. The approach employs a layered non-encoding encryption-compression algorithm DQRc (Data in Quick Response Code) that attempts to ...
Pratham Mishra +4 more
doaj +1 more source
An RGB Image Cipher Using Chaotic Systems, 15-Puzzle Problem and DNA Computing
The application of confusion and diffusion processes on the three individual components of an RGB image is not secure and efficient, so this problem needs to be addressed.
Nadeem Iqbal +5 more
doaj +1 more source
The security of powering systems has been a major problem over the last decade, leading to an increased interest in wireless power and data transfer. In this research paper, a new inductive Wireless Power Transfer (WPT) circuit topology has been used. In
Colin Sokol Kuka +4 more
doaj +1 more source
This paper discusses the encryption-decryption-based state estimation (EDBSE) issue for coupled perturbation complex networks (CPCNs) in the framework of the Kalman-type filtering scheme.
Peixia Gao, Chaoqing Jia, Aozhan Zhou
semanticscholar +1 more source
Decryption of tissue factor [PDF]
Tissue factor (TF) is a transmembrane protein which, in complex with factor (F)VIIa, initiates blood coagulation. Numerous studies have determined TF epitopes and individual amino acids which play an important role in the TF/FVIIa complex formation and its activity towards natural substrates.
Saulius, Butenas, Jolanta, Krudysz-Amblo
openaire +2 more sources
Single image encryption schemes are not efficient enough when a bunch of images is to be encrypted in some real-world setting. To overcome this problem, an efficient and secured multiple images encryption scheme is proposed in this study using two ...
Muhammad Hanif +4 more
doaj +1 more source

