Results 51 to 60 of about 46,684 (278)
Securing DSR with mobile agents in wireless ad hoc networks
Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio ...
Ahmed Abosamra +2 more
doaj +1 more source
A chiral photodetector capable of selectively distinguishing left‐ and right‐handed circularly polarized light is experimentally demonstrated. The device, which features a nanopatterned electrode inverse‐designed by a genetic algorithm within a metal–dielectric–metal nanocavity that incorporates a vacuum‐deposited small‐molecule multilayer, exhibits ...
Kyung Ryoul Park +3 more
wiley +1 more source
trengthened Key Method in Transition to Quantum Cryptology
This study aims to increase security during the transition period against the threats posed by quantum computers to existing cryptographic systems. Since it will take time for post-quantum cryptography standards to become fully applicable, especially ...
Fatih Selvi , Mustafa Alkan
doaj +1 more source
This study discusses specifically the encryption mechanism that maintains the integrity of the game data on online games. The purpose of this study is to implement symmetric key encryption and checksum for score calculation.
Herru Darmadi
doaj +1 more source
Outer-Convex Dominating Set in the Corona of Graphs as Encryption Key Generator
In this paper, we present a new type of symmetric encryption by converting the classical monoalphabetic affine cipher into a polyalphabetic cipher. The proposed encryption utilizes the properties of outer-convex dominating set in the corona of graphs to ...
Zehui Shao +4 more
doaj +1 more source
Measurement of Symmetric Cipher on Low Power Devices for Power Grids [PDF]
The symmetric ciphers are often used in low power devices for its low requirements. This article provides a measurement of AES-128 cipher, which should be used for secure communication in power grid (smart grid) networks.
Fujdiak, R.
core
Contact Lens with Moiré Patterns for High‐Precision Eye Tracking
This work presents a passive contact lens for high‐precision eye tracking, integrating a microscopic moiré grating label. The parallax‐induced shift of macroscopic moiré patterns enables angle measurement with 0.28° precision using a standard camera under ambient light.
Ilia M. Fradkin +11 more
wiley +1 more source
Hybrid homomorphic encryption (a.k.a., transciphering) can alleviate the ciphertext size expansion inherent to fully homomorphic encryption by integrating a specific symmetric encryption scheme, which requires selected symmetric encryption scheme that ...
Benqiang Wei +5 more
doaj +1 more source
Quantum cryptography: a practical information security perspective [PDF]
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G. +2 more
core +1 more source
Applications of tripled chaotic maps in cryptography
Security of information has become a major issue during the last decades. New algorithms based on chaotic maps were suggested for protection of different types of multimedia data, especially digital images and videos in this period. However, many of them
A. Akhavan +48 more
core +1 more source

