Search

Your search keyword '"Key generation"' showing total 48 results

Search Constraints

Start Over You searched for: Descriptor "Key generation" Remove constraint Descriptor: "Key generation" Publisher springer nature Remove constraint Publisher: springer nature
48 results on '"Key generation"'

Search Results

1. CCM-PRNG: Pseudo-random bit generator based on cross-over chaotic map and its application in image encryption.

2. An innovative image encryption algorithm enhanced with the Pan-Tompkins Algorithm for optimal security.

3. HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment.

4. SSKA: secure symmetric encryption exploiting Kuznyechik algorithm for trustworthy communication.

5. Decentralized blockchain-based security enhancement with lamport merkle digital signature generation and optimized encryption in cloud environment.

6. A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm.

7. A Low Bit Instability CMOS PUF Based on Current Mirrors and WTA Cells.

8. Efficient Key Generation Techniques for Wireless Body Area Network.

9. Deep learning with metaheuristics based data sensing and encoding scheme for secure cyber physical sensor systems.

10. Design and Simulation of Physical Layer Security for Next Generation Intelligent Optical Networks.

11. Crytographical primitive for blockchain: a secure random DNA encoded key generation technique.

12. Opposition Based Joint Grey Wolf-Whale Optimization Algorithm Based Attribute Based Encryption in Secure Wireless Communication.

13. Dynamic resource provisioning and secured file sharing using virtualization in cloud azure.

14. A Secured Storage and Communication System for Cloud Using ECC, Polynomial Congruence and DSA.

15. Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture.

16. Pairing-Free Identity-Based Digital Signature Algorithm for Broadcast Authentication Based on Modified ECC Using Battle Royal Optimization Algorithm.

17. An Efficient Enhanced Full Homomorphic Encryption for Securing Video in Cloud Environment.

18. CCSC—DHKEP: Data Confidentiality Using Improved Security Approaches in Cloud Environment.

19. A novel approach for Chaotic image Encryption based on block level permutation and bit-wise substitution.

20. Actively Secure Setup for SPDZ.

21. QMLFD Based RSA Cryptosystem for Enhancing Data Security in Public Cloud Storage System.

22. A Non-Time-Limited Channel Sounding Protocol for Key Generation.

23. Architectural framework and simulation of quantum key optimization techniques in healthcare networks for data security.

24. A Matrix Translation and Elliptic Curve Based Cryptosystem for Secured Data Communications in WSNs.

25. ECC-CRT: An Elliptical Curve Cryptographic Encryption and Chinese Remainder Theorem based Deduplication in Cloud.

26. An efficient data transmission approach using IAES-BE.

27. Review of error correction for PUFs and evaluation on state-of-the-art FPGAs.

28. An ASCII based effective and multi-operation image encryption method.

29. Vehicular networks with security and trust management solutions: proposed secured message exchange via blockchain technology.

30. Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation.

31. Efficient physical layer key generation technique in wireless communications.

32. An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing.

33. A lightweight physical-layer based security strategy for Internet of things.

34. A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data.

35. Fuzzy enhanced secure multicast routing for improving authentication in MANET.

36. SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks.

37. Efficient key generation leveraging channel reciprocity and balanced gray code.

38. Signature Verification and Bloom Hashing Technique for Efficient Cloud Data Storage.

39. Dynamic resource provisioning and secured file sharing using virtualization in cloud azure

40. Secure key generation from biased PUFs: extended version.

41. Efficient CRT-RSA Decryption for Small Encryption Exponents.

42. A New Side-Channel Attack on RSA Prime Generation.

43. Linear Slide Attacks on the KeeLoq Block Cipher.

44. RSA Moduli with a Predetermined Portion: Techniques and Applications.

45. SERA: a secure energy reliability aware data gathering for sensor networks.

46. Genetic-based random key generator (GRKG): a new method for generating more-random keys for one-time pad cryptosystem.

47. k-Party shared RSA key generation.

48. Fingerprint-based crypto-biometric system for network security

Catalog

Books, media, physical & digital resources