Results 41 to 50 of about 738 (105)
Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar +11 more
wiley +1 more source
Improvement of the Minimal‐Guess‐Basis MILP Model and Its Application to ESF
The guess‐and‐determine technique find wide applications in the recovery of unknown variables within given system of relations. The fundamental concept behind this technique involves guessing certain unknown variables and deducing the remaining ones based on the relational system.
Lingchen Li +5 more
wiley +1 more source
A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej +4 more
wiley +1 more source
Automated Risk‐Based Cryptoperiod Calculation in ICSs: Analytical Framework and Software Tool
ABSTRACT Internal network and system reconnaissance is one of the first crucial stages of most cyber attacks, though it plays an especially important role in attacks on complex industrial control systems (ICSs) that span both IT and OT environments. Frequently, besides device enumeration and scanning, a malicious ICS reconnaissance campaign will also ...
Gabriele Cianfarani +2 more
wiley +1 more source
Abstract This paper introduces a novel lightweight colour image encryption algorithm, specifically designed for resource‐constrained environments such as Internet of Things (IoT) devices. As IoT systems become increasingly prevalent, secure and efficient data transmission becomes crucial.
Kenan İnce, Cemile İnce, Davut Hanbay
wiley +1 more source
NoLIEM: A Novel Lightweight Image Encryption Method for Resource‐Constrained IoT Devices
The expanded use of Internet of Things (IoT) devices in smart homes, industrial automation, healthcare, and smart cities has increased the risk of unauthorized access, data breaches, and man‐in‐the‐middle attacks. Traditional encryption methods like AES and RSA are too energy‐ and processing‐intensive for IoT devices.
Athraa J. H. Witwit +3 more
wiley +1 more source
A Bit-Vector Differential Model for the Modular Addition by a Constant [PDF]
ARX algorithms are a class of symmetric-key algorithms constructed by Addition, Rotation, and XOR, which achieve the best software performances in low-end microcontrollers.
A Biryukov +38 more
core +2 more sources
Green IoT: Energy Efficiency, Renewable Integration, and Security Implications
This paper surveys energy management strategies in IoT, emphasising energy harvesting and saving techniques to reduce energy consumption and extend network lifespan. It explores renewable energy integration to lower carbon footprints and improve device efficiency, while addressing security vulnerabilities in energy management practices.
Mohammed Qasim Alazzawi +3 more
wiley +1 more source
Tamper Localisation Using Quantum Fourier Transform Signatures for Medical Image Authentication
We present a tamper‐localisation framework that embeds authentication signatures as phase‐only perturbations in blockwise QFT coefficients using keyed sparse mid‐band supports and light cross‐block coupling, preserving magnitudes (energy) and imperceptibility.
Kumar Sekhar Roy +4 more
wiley +1 more source
The growth of billions of devices functioning in resource‐constrained situations in the Internet of Things (IoT) era poses serious security issues. As a result of their limited processing power efficiency, memory, and battery life, traditional cryptographic algorithms like elliptic curve cryptography (ECC), Rivest–Shamir–Adleman (RSA), and Advanced ...
Nahom Gebeyehu Zinabu +4 more
wiley +1 more source

