Results 31 to 40 of about 39,375 (295)

Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor Network

open access: yesJournal of Communications Software and Systems
A Wireless Sensor Network (WSN) is a collection of sensors that communicate or track a specific object. It is used in many fields of war, architecture, or espionage, but the wireless sensor network faces challenges in securing the path or the message ...
Haneen Mohammed Hussein   +2 more
doaj   +1 more source

Ultralong room temperature phosphorescence from amorphous organic materials toward confidential information encryption and decryption

open access: yesScience Advances, 2018
Ultralong room temperature phosphorescence is achieved from amorphous organic materials toward information encryption. Ultralong room temperature phosphorescence (URTP) emitted from pure amorphous organic molecules is very rare.
Yan Su   +9 more
semanticscholar   +1 more source

Analytical Study of Hybrid Techniques for Image Encryption and Decryption

open access: yesItalian National Conference on Sensors, 2020
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
C. L. Chowdhary   +5 more
semanticscholar   +1 more source

DeCrypt: a 3DES inspired optimised cryptographic algorithm

open access: yesJournal of Ambient Intelligence and Humanized Computing, 2022
Triple Data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for authentication and encryption. However, as per a draft published by NIST in 2018, 3DES is officially being retired and not suggested to use for new applications.
Deepraj Chowdhury   +6 more
openaire   +2 more sources

A Lossless Layered-Based Non-Encoding Plain Text Compression and Encryption Algorithm Utilizing Binary Fragmentation and Defragmentation Technique

open access: yesIEEE Access
This paper proposes an innovative fusion of encryption and compression techniques that optimizes data handling and security. The approach employs a layered non-encoding encryption-compression algorithm DQRc (Data in Quick Response Code) that attempts to ...
Pratham Mishra   +4 more
doaj   +1 more source

An RGB Image Cipher Using Chaotic Systems, 15-Puzzle Problem and DNA Computing

open access: yesIEEE Access, 2019
The application of confusion and diffusion processes on the three individual components of an RGB image is not secure and efficient, so this problem needs to be addressed.
Nadeem Iqbal   +5 more
doaj   +1 more source

A Novel True Random Number Generator in Near Field Communication as Memristive Wireless Power Transmission

open access: yesJ, 2021
The security of powering systems has been a major problem over the last decade, leading to an increased interest in wireless power and data transfer. In this research paper, a new inductive Wireless Power Transfer (WPT) circuit topology has been used. In
Colin Sokol Kuka   +4 more
doaj   +1 more source

Encryption–decryption-based state estimation for nonlinear complex networks subject to coupled perturbation

open access: yesSystems Science & Control Engineering
This paper discusses the encryption-decryption-based state estimation (EDBSE) issue for coupled perturbation complex networks (CPCNs) in the framework of the Kalman-type filtering scheme.
Peixia Gao, Chaoqing Jia, Aozhan Zhou
semanticscholar   +1 more source

Decryption of tissue factor [PDF]

open access: yesThrombosis Research, 2012
Tissue factor (TF) is a transmembrane protein which, in complex with factor (F)VIIa, initiates blood coagulation. Numerous studies have determined TF epitopes and individual amino acids which play an important role in the TF/FVIIa complex formation and its activity towards natural substrates.
Saulius, Butenas, Jolanta, Krudysz-Amblo
openaire   +2 more sources

A Novel and Efficient 3D Multiple Images Encryption Scheme Based on Chaotic Systems and Swapping Operations

open access: yesIEEE Access, 2020
Single image encryption schemes are not efficient enough when a bunch of images is to be encrypted in some real-world setting. To overcome this problem, an efficient and secured multiple images encryption scheme is proposed in this study using two ...
Muhammad Hanif   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy