Results 51 to 60 of about 46,684 (278)

Securing DSR with mobile agents in wireless ad hoc networks

open access: yesEgyptian Informatics Journal, 2011
Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio ...
Ahmed Abosamra   +2 more
doaj   +1 more source

Circular‐Polarization‐Sensitive Organic Photodetectors with a Chiral Nanopatterned Electrode Inverse‐Designed by Genetic Algorithm

open access: yesAdvanced Functional Materials, EarlyView.
A chiral photodetector capable of selectively distinguishing left‐ and right‐handed circularly polarized light is experimentally demonstrated. The device, which features a nanopatterned electrode inverse‐designed by a genetic algorithm within a metal–dielectric–metal nanocavity that incorporates a vacuum‐deposited small‐molecule multilayer, exhibits ...
Kyung Ryoul Park   +3 more
wiley   +1 more source

trengthened Key Method in Transition to Quantum Cryptology

open access: yesGazi Üniversitesi Fen Bilimleri Dergisi
This study aims to increase security during the transition period against the threats posed by quantum computers to existing cryptographic systems. Since it will take time for post-quantum cryptography standards to become fully applicable, especially ...
Fatih Selvi , Mustafa Alkan
doaj   +1 more source

Implementasi Mekanisme Keamanan Data dengan Enkripsi Symmetric Key dan Checksum Variable pada Game Online

open access: yesComTech, 2013
This study discusses specifically the encryption mechanism that maintains the integrity of the game data on online games. The purpose of this study is to implement symmetric key encryption and checksum for score calculation.
Herru Darmadi
doaj   +1 more source

Outer-Convex Dominating Set in the Corona of Graphs as Encryption Key Generator

open access: yesComplexity, 2020
In this paper, we present a new type of symmetric encryption by converting the classical monoalphabetic affine cipher into a polyalphabetic cipher. The proposed encryption utilizes the properties of outer-convex dominating set in the corona of graphs to ...
Zehui Shao   +4 more
doaj   +1 more source

Measurement of Symmetric Cipher on Low Power Devices for Power Grids [PDF]

open access: yes, 2015
The symmetric ciphers are often used in low power devices for its low requirements. This article provides a measurement of AES-128 cipher, which should be used for secure communication in power grid (smart grid) networks.
Fujdiak, R.
core  

Contact Lens with Moiré Patterns for High‐Precision Eye Tracking

open access: yesAdvanced Functional Materials, EarlyView.
This work presents a passive contact lens for high‐precision eye tracking, integrating a microscopic moiré grating label. The parallax‐induced shift of macroscopic moiré patterns enables angle measurement with 0.28° precision using a standard camera under ambient light.
Ilia M. Fradkin   +11 more
wiley   +1 more source

Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of TFHE

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Hybrid homomorphic encryption (a.k.a., transciphering) can alleviate the ciphertext size expansion inherent to fully homomorphic encryption by integrating a specific symmetric encryption scheme, which requires selected symmetric encryption scheme that ...
Benqiang Wei   +5 more
doaj   +1 more source

Quantum cryptography: a practical information security perspective [PDF]

open access: yes, 2009
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G.   +2 more
core   +1 more source

Applications of tripled chaotic maps in cryptography

open access: yes, 2007
Security of information has become a major issue during the last decades. New algorithms based on chaotic maps were suggested for protection of different types of multimedia data, especially digital images and videos in this period. However, many of them
A. Akhavan   +48 more
core   +1 more source

Home - About - Disclaimer - Privacy