Search

Your search keyword '"ADVANCED Encryption Standard"' showing total 424 results

Search Constraints

Start Over You searched for: Descriptor "ADVANCED Encryption Standard" Remove constraint Descriptor: "ADVANCED Encryption Standard" Database Academic Search Index Remove constraint Database: Academic Search Index
424 results on '"ADVANCED Encryption Standard"'

Search Results

1. Optimizing video data security: A hybrid MAES-ECC encryption technique for efficient internet transmission.

2. Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis.

3. Fuzzy enhanced location aware secure multicast routing protocol for balancing energy and security in wireless sensor network.

4. Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing.

5. SDESA: secure cloud computing with gradient deep belief network and congruential advanced encryption.

6. Data privacy based on two-stage adaptive Morse algorithm.

7. A non-redundant cost-effective platform and data security in cloud computing using improved lightweight standalone framework over data encryption standard algorithm.

8. An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials.

9. Leveraging Grover’s Algorithm for Quantum Searchable Encryption in Cloud Infrastructure and its application in AES Resource Estimation.

10. Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem.

11. Low-power secure caching strategy for Internet of vehicles.

12. Design of a Low-Power Cryptographic Accelerator Under Advanced Encryption Standard.

13. Supply chain management with secured data transmission via improved DNA cryptosystem.

14. Multi-Keyword Ranked Search in Cloud Environment.

15. DTR-SHIELD: Mutual Synchronization for Protecting against DoS Attacks on the SHIELD Protocol with AES-CTR Mode.

16. Symmetry Analysis in Construction Two Dynamic Lightweight S-Boxes Based on the 2D Tinkerbell Map and the 2D Duffing Map.

17. A method to mitigate cyber exploits on automatic dependent surveillance-broadcast (ADS-B) data transmissions.

18. 5G enabled IoT network and security in healthcare.

19. A secure and cost effective platform for employee management system using lightweight standalone framework over message digest 5 algorithm.

20. A Technique for Securing Insar Interferograms using Cryptography.

21. The Security Evaluation of an Efficient Lightweight AES Accelerator †.

22. Design and implementation of a cryptographic algorithm based on the AES advanced encryption standard for UHF RFID systems.

23. Multi-stage cryptography technique for wireless networks.

24. Incorporating rivest-shamir-adleman algorithm and advanced encryption standard in payment gateway system.

25. Advances in Cybersecurity and Reliability.

26. Construction of secure adaptive frequency hopping sequence sets based on AES algorithm.

27. Performance of Secure Framework AES Algorithm using Cloud Computing.

28. A novel S-box design based on quantum tent maps and fractional stochastic models with an application in image encryption.

29. E2EE enhanced patient-centric blockchain-based system for EHR management.

30. A combination of hill cipher and RC4 methods for text security.

31. A Modified AES-512 Bits Algorithm for Data Encryption.

32. An innovative approach for runtime analysis of 128 bits AES algorithm by comparing with DES algorithm using VHDL.

33. A secure and cost effective platform for employee management system using lightweight standalone framework over El Gamal encryption algorithm.

34. EFTS: An encryption file transfer system applying advanced encryption standard (AES) algorithm.

35. Lower data attacks on Advanced Encryption Standard.

36. Deep Learning-Based Power Analysis Attack for Extracting AES Keys on ATmega328P Microcontroller.

37. PPSecS: Privacy-Preserving Secure Big Data Storage in a Cloud Environment.

38. Smart plant disease net: Adaptive Dense Hybrid Convolution network with attention mechanism for IoT-based plant disease detection by improved optimization approach.

39. Internet of medical things-based authentication for an optimized watermarking of encrypted EEG.

40. Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard.

41. An adaptive image encryption scheme guided by fuzzy models.

42. An approach for runtime analysis of 128 bits innovative advanced encryption standard algorithm over triple DES algorithm using VHDL.

43. A novel image retrieval method for encryption and decryption to preserve privacy using AES algorithm and comparing accuracy with DES algorithm.

44. Design and FPGA implementation machine learning based steller matrix encryption and decryption for high throughput and low latency.

45. Secure double MAC implementation for STBC based FECG monitoring.

46. Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems.

47. IoT integration of securable optical transmission using Paillier assisted advanced encryption standard.

48. Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs.

49. Chaos Meets Cryptography: Developing an S-Box Design with the Rössler Attractor.

50. A Novel Hybrid MSA-CSA Algorithm for Cloud Computing Task Scheduling Problems.

Catalog

Books, media, physical & digital resources