Search

Your search keyword '"ADVANCED Encryption Standard"' showing total 31 results

Search Constraints

Start Over You searched for: Descriptor "ADVANCED Encryption Standard" Remove constraint Descriptor: "ADVANCED Encryption Standard" Journal ieee access Remove constraint Journal: ieee access
31 results on '"ADVANCED Encryption Standard"'

Search Results

1. Enhancing Cloud Task Scheduling With a Robust Security Approach and Optimized Hybrid POA

2. A Polymorphic Advanced Encryption Standard – A Novel Approach

3. Efficient Privacy-Preserving Scheme for Location Based Services in VANET System

4. A Novel Algebraic Technique for Design of Computational Substitution-Boxes Using Action of Matrices on Galois Field

5. On-the-Fly Parallel Processing IP-Core for Image Blur Detection, Compression, and Chaotic Encryption Based on FPGA

6. UCloD: Small Clock Delays to Mitigate Remote Power Analysis Attacks

7. Synchronous Real-Time Sampling Technique for Side-Channel Analysis Against Randomly Varying Clock-Based Countermeasures

8. BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture

9. Optimization of Advanced Encryption Standard on Graphics Processing Units

10. A Polymorphic Advanced Encryption Standard – A Novel Approach

11. Efficient Implementation of AES and CTR_DRBG on 8-Bit AVR-Based Sensor Nodes

12. A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups

13. Improved SERPENT Algorithm: Design to RGB Image Encryption Implementation

14. Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography

15. Secure Service Provisioning Scheme for Lightweight IoT Devices With a Fair Payment System and an Incentive Mechanism Based on Blockchain

16. A Hybrid MCDM Approach of Selecting Lightweight Cryptographic Cipher Based on ISO and NIST Lightweight Cryptography Security Requirements for Internet of Health Things

17. A Low Power Circuit Design for Chaos-Key Based Data Encryption

18. Security and Performance in IoT: A Balancing Act

19. A Novel Algebraic Technique for Design of Computational Substitution-Boxes Using Action of Matrices on Galois Field

20. An Efficient Collision Power Attack on AES Encryption in Edge Computing

21. A Novel Method for Image Encryption Based on Chaos and Transcendental Numbers

22. Low-Power AES Data Encryption Architecture for a LoRaWAN

23. Analyzing Physical Layer Security of Antenna Subset Modulation as Block Encryption Ciphers

24. Performance Analysis of Cryptographic Pseudorandom Number Generators

25. Low-Latency Approach for Secure ECG Feature Based Cryptographic Key Generation

26. AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments

27. Joint Crypto-Stego Scheme for Enhanced Image Protection With Nearest-Centroid Clustering

28. A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense

29. HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform

30. Secure Medical Data Transmission Model for IoT-Based Healthcare Systems

31. A Secure and High-Capacity Data-Hiding Method Using Compression, Encryption and Optimized Pixel Value Differencing

Catalog

Books, media, physical & digital resources