Results 81 to 90 of about 6,728,968 (223)
Multi‐Scale Soil Salinization Dynamics From Global to Pore Scale: A Review
Abstract Soil salinization refers to the accumulation of water‐soluble salts in the upper part of the soil profile. Excessive levels of soil salinity affects crop production, soil health, and ecosystem functioning. This phenomenon threatens agriculture, food security, soil stability, and fertility leading to land degradation and loss of essential soil ...
Nima Shokri +2 more
wiley +1 more source
Developed Method of Information Hiding in Video AVI File Based on Hybrid Encryption and Steganography [PDF]
This paper produces a development of an AVI Hiding Information System (HIS) based on steganography techniques to prevent intruders to obtain the transmitted information.
Susan S. Ghazoul +2 more
doaj +1 more source
Plaintext Recovery in DES-like Cryptosystems Based on S-boxes with Embedded Parity Check [PDF]
We describe an approach for recovering the plaintext in block ciphers having a design structure similar to the Data Encryption Standard but with improperly constructed S-boxes.
Angelova, Vesela, Borissov, Yuri
core
A literature review on V2X communications security: Foundation, solutions, status, and future
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying +3 more
wiley +1 more source
SAT-Based Security Evaluation for WARP against Linear Cryptanalysis
WARP, an efficient lightweight block cipher presented by Banik et al., offers a viable alternative to AES with its 128-bit block and a 128-bit key.
Jiali Shi, Guoqiang Liu, Chao Li
doaj +1 more source
We studied the metabolism of caterpillars of the poplar hawk‐moth (Laothoe populi L.)—a specialist insect herbivore—on different host plants. Caterpillars feeding on the same host plant unveiled small chemical variation in their frass profiles. Ingested flavonoids were most widely passively excreted by the caterpillars, whereas salicinoids were ...
Carlo L. Seifert +2 more
wiley +1 more source
A Novel Block Encryption Algorithm Based on Chaotic S-Box for Wireless Sensor Network
In order to ensure the basic security of wireless sensor networks (WSNs), a block encryption algorithm based on chaotic substitution box (S-box) is proposed.
Longteng Yi +5 more
doaj +1 more source
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed +2 more
core +1 more source
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC‐IoT, and SLA are lightweight block ciphers developed for IoT systems. The designer of SLIM presented a 7‐round differential distinguisher and an 11‐round linear trail using a heuristic method. We have comprehensively sought the longest distinguisher
Nobuyuki Sugio, Qichun Wang
wiley +1 more source
LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks [PDF]
Data confidentiality in wireless sensor networks is mainly achieved by RC5 and Skipjack encryption algorithms. However, both algorithms have their weaknesses, for example RC5 supports variable-bit rotations, which are computationally expensive operations
Komninos, N. +2 more
core

