Results 81 to 90 of about 6,728,968 (223)

Multi‐Scale Soil Salinization Dynamics From Global to Pore Scale: A Review

open access: yesReviews of Geophysics, Volume 62, Issue 4, December 2024.
Abstract Soil salinization refers to the accumulation of water‐soluble salts in the upper part of the soil profile. Excessive levels of soil salinity affects crop production, soil health, and ecosystem functioning. This phenomenon threatens agriculture, food security, soil stability, and fertility leading to land degradation and loss of essential soil ...
Nima Shokri   +2 more
wiley   +1 more source

Developed Method of Information Hiding in Video AVI File Based on Hybrid Encryption and Steganography [PDF]

open access: yesEngineering and Technology Journal, 2011
This paper produces a development of an AVI Hiding Information System (HIS) based on steganography techniques to prevent intruders to obtain the transmitted information.
Susan S. Ghazoul   +2 more
doaj   +1 more source

Plaintext Recovery in DES-like Cryptosystems Based on S-boxes with Embedded Parity Check [PDF]

open access: yes, 2013
We describe an approach for recovering the plaintext in block ciphers having a design structure similar to the Data Encryption Standard but with improperly constructed S-boxes.
Angelova, Vesela, Borissov, Yuri
core  

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

SAT-Based Security Evaluation for WARP against Linear Cryptanalysis

open access: yesIET Information Security, 2023
WARP, an efficient lightweight block cipher presented by Banik et al., offers a viable alternative to AES with its 128-bit block and a 128-bit key.
Jiali Shi, Guoqiang Liu, Chao Li
doaj   +1 more source

Different fates of metabolites and small variation in chemical composition characterise frass chemistry in a specialist caterpillar

open access: yesPhysiological Entomology, Volume 49, Issue 2, Page 110-117, June 2024.
We studied the metabolism of caterpillars of the poplar hawk‐moth (Laothoe populi L.)—a specialist insect herbivore—on different host plants. Caterpillars feeding on the same host plant unveiled small chemical variation in their frass profiles. Ingested flavonoids were most widely passively excreted by the caterpillars, whereas salicinoids were ...
Carlo L. Seifert   +2 more
wiley   +1 more source

A Novel Block Encryption Algorithm Based on Chaotic S-Box for Wireless Sensor Network

open access: yesIEEE Access, 2019
In order to ensure the basic security of wireless sensor networks (WSNs), a block encryption algorithm based on chaotic substitution box (S-box) is proposed.
Longteng Yi   +5 more
doaj   +1 more source

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

open access: yes, 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed   +2 more
core   +1 more source

Bit‐Based Evaluation of Lightweight Block Ciphers SLIM, LBC‐IoT, and SLA by Mixed Integer Linear Programming

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC‐IoT, and SLA are lightweight block ciphers developed for IoT systems. The designer of SLIM presented a 7‐round differential distinguisher and an 11‐round linear trail using a heuristic method. We have comprehensively sought the longest distinguisher
Nobuyuki Sugio, Qichun Wang
wiley   +1 more source

LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks [PDF]

open access: yes, 2007
Data confidentiality in wireless sensor networks is mainly achieved by RC5 and Skipjack encryption algorithms. However, both algorithms have their weaknesses, for example RC5 supports variable-bit rotations, which are computationally expensive operations
Komninos, N.   +2 more
core  

Home - About - Disclaimer - Privacy