Results 11 to 20 of about 8,161,700 (320)

Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak [PDF]

open access: yesSensors, 2020
Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient ...
An Braeken
doaj   +3 more sources

PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices [PDF]

open access: yesSensors, 2019
With the growing number of heterogeneous resource-constrained devices connected to the Internet, it becomes increasingly challenging to secure the privacy and protection of data.
Daniel A. F. Saraiva   +5 more
doaj   +3 more sources

Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution

open access: yesDigital Communications and Networks, 2020
There are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this paper, we propose a compression-encryption model to solve these problems.
Emy Setyaningsih   +2 more
doaj   +4 more sources

Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks

open access: yesComputers, 2019
This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol.
Matthias Carlier   +2 more
doaj   +4 more sources

Symmetric autocompensating quantum key distribution [PDF]

open access: yesSPIE Proceedings, 2004
4 pages, 2 ...
Walton, Zachary D.   +4 more
openaire   +3 more sources

Symmetric key structural residues in symmetric proteins with beta-trefoil fold. [PDF]

open access: yesPLoS ONE, 2010
To understand how symmetric structures of many proteins are formed from asymmetric sequences, the proteins with two repeated beta-trefoil domains in Plant Cytotoxin B-chain family and all presently known beta-trefoil proteins are analyzed by structure ...
Jianhui Feng   +3 more
doaj   +2 more sources

An enhanced symmetric-key based 5G-AKA protocol

open access: yesComputer Networks, 2021
J. Munilla, M. Burmester, R. Barco
semanticscholar   +3 more sources

Block Ciphers Analysis Based on a Fully Connected Neural Network

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2023
With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data
Ali H. Alwan, Ali H. Kashmar
doaj   +1 more source

A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles

open access: yesElectronics, 2023
Unmanned aerial vehicles have found applications in fields such as environmental monitoring and the military. Although the collected data in some of these application domains are sensitive, public channels are deployed during the communication process ...
V. Nyangaresi   +6 more
semanticscholar   +1 more source

A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm

open access: yesBulletin of Electrical Engineering and Informatics, 2023
Today's digital data transmission over unsecured wired and wireless communication channels is making encryption algorithms an increasingly important tool for securing data and information. Hybrid encryption techniques combine encryption schemes of either
P. Kuppuswamy   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy