Results 31 to 40 of about 41,294 (296)

Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security Applications

open access: yesIEEE Access, 2022
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies.
Basel Halak   +2 more
doaj   +1 more source

Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks [PDF]

open access: yesPeerJ Computer Science, 2023
Background With the extensive application and continuous expansion of the Internet of Things (IoT), the access of a large number of resource-limited nodes makes the IoT application face a variety of security vulnerabilities and efficiency limitations ...
Zhongya Liu, Yunxiao Luo
doaj   +2 more sources

Secure E-Commerce Scheme

open access: yesIEEE Access, 2022
E-commerce security has recently been an emerging topic due to the escalation in credit card fraud and stolen user accounts. In general, the security bridge and privacy leakage occur on the side of e-commerce companies due to various factors such as ...
Sena Efsun Cebeci   +2 more
doaj   +1 more source

RK algorithm: stochastic parallel methodology for symmetric key cryptography [PDF]

open access: yesAPTIKOM Journal on Computer Science and Information Technologies, 2017
With the enormous growth in the Internet and network, data security has become an inevitable concern forany organization. From antecedent security has attracted considerable attention from network researchers. In thisperspective many possible fields of endeavour come to mind with many cryptographic algorithms in a broader way,each is highly worthy and ...
Yegireddi Ramesh, Kiran Kumar Reddi
openaire   +1 more source

Optimized Implementation and Analysis of CHAM in Quantum Computing

open access: yesApplied Sciences, 2023
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang   +3 more
doaj   +1 more source

Quantum key distribution rates from non-symmetric conic optimization [PDF]

open access: yesQuantum
Computing key rates in quantum key distribution (QKD) numerically is essential to unlock more powerful protocols, that use more sophisticated measurement bases or quantum systems of higher dimension.
Andrés González Lorente   +3 more
doaj   +1 more source

A computational enhancement of Base64 algorithm using Residue Number System algorithms [PDF]

open access: yesRevista Română de Informatică și Automatică
Today's daily existence depends heavily on the advancement of data, information and communication technologies. Consequently, there is a huge increase in the need for data and information.
Kolawole Bariu LOGUNLEKO   +4 more
doaj   +1 more source

A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis

open access: yesJournal of Sensor and Actuator Networks, 2022
The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally
Koketso Ntshabele   +3 more
doaj   +1 more source

Public key based key distribution scheme for wireless sensor networks

open access: yesTongxin xuebao, 2011
Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN,a new public key based key distribution scheme was proposed.In the scheme,public key set was generated by an initial public ...
HUANG Jie1, HUANG Bei1
doaj   +2 more sources

Apply Block Ciphers Using Tiny Encryption Algorithm (TEA)

open access: yesمجلة بغداد للعلوم, 2010
Ciphers can be either symmetric-key or public-key. Symmetric-key ciphers are the most famous and important elements in many cryptographic systems. Individually, they provide confidentiality and privacy.
Hana Rashied Ismaeel
doaj   +1 more source

Home - About - Disclaimer - Privacy