Search

Your search keyword '"Key generation"' showing total 1,691 results

Search Constraints

Start Over You searched for: Descriptor "Key generation" Remove constraint Descriptor: "Key generation" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
1,691 results on '"Key generation"'

Search Results

2. VBDPA Multi-Criteria Task Scheduling Algorithm in Container Based Cloud Computing Environment.

3. Kalman filtering based preprocessing for secure key generation.

4. An Approach of Modified IDEA with 1024 Bits Key to Enhance Security and Efficiency of Data Transmission in the Healthcare Sector.

5. An Approach of Modified IDEA with 1024 Bits Key to Enhance Security and Efficiency of Data Transmission in the Healthcare Sector

6. Enhancing the SRAM PUF with an XOR Gate.

7. A Novel High-Speed Data Encryption Scheme for Internet of Medical Things Using Modified Elliptic Curve Diffie–Hellman and Advance Encryption Standard.

8. Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix.

9. Key Generation and Testing Based on Biometrics

10. Study of Network Security Based on Key Management System for In-Vehicle Ethernet.

11. Image encryption with leveraging blockchain-based optimal deep learning for Secure Disease Detection and Classification in a smart healthcare environment.

12. Image encryption with leveraging blockchain-based optimal deep learning for Secure Disease Detection and Classification in a smart healthcare environment

13. An Improved Lightning Search Algorithm-based End-to-End Lightweight Partially Homomorphic Encryption Approach for Enhanced IoT Security

14. A framework for application-centric Internet of Things authentication

15. Improving Digital Forensic Security: A Secure Storage Model With Authentication and Optimal Key Generation Based Encryption

16. Enhancing the SRAM PUF with an XOR Gate

17. Enhancing Security in Online Voting Systems: A Cryptographic Approach Utilizing Galois Fields.

18. A Low Bit Instability CMOS PUF Based on Current Mirrors and WTA Cells.

19. Generalization of RSA cryptosystem based on 2n primes

20. Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis

21. Securing the Information using Improved Modular Encryption Standard in Cloud Computing Environment.

22. Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing

23. Encrypt with Your Mind: Reliable and Revocable Brain Biometrics via Multidimensional Gaussian Fitted Bit Allocation.

24. Generalization of RSA cryptosystem based on 2n primes.

25. Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis.

26. Internet of Medical Things with a Blockchain-Assisted Smart Healthcare System Using Metaheuristics with a Deep Learning Model.

27. Enhanced Rsa (Ersa): An Advanced Mechanism for Improving the Security.

28. On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices.

29. Privacy-Preserving Blockchain Framework for Supply Chain Management: Perceptive Craving Game Search Optimization (PCGSO).

30. A New Sine-Ikeda Modulated Chaotic Key for Cybersecurity.

31. Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments.

32. RSA based encryption approach for preserving confidentiality of big data

33. An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay

34. Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing.

35. Privacy Preserving Image Encryption with Optimal Deep Transfer Learning Based Accident Severity Classification Model.

36. An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments.

37. Efficient RO-PUF for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems.

38. Secured information sharing in SCM: Parametric Analysis on Improved Beetle Swarm Optimization.

39. Enhancing Data Security in Mobile Cloud using Novel key Generation.

40. Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach.

41. Dynamic resource provisioning and secured file sharing using virtualization in cloud azure.

42. A novel secure privacy-preserving data sharing model with deep-based key generation on the blockchain network in the cloud.

43. APPS: Authentication-enabled privacy protection scheme for secure data transfer in Internet of Things.

44. Omega Network Pseudorandom Key Generation Based on DNA Cryptography.

45. Non-Reconciled Physical-Layer Keys-Assisted Secure Communication Scheme Based on Channel Correlation.

46. Decision Tree Based Key Management for Secure Group Communication.

47. Blockchain for Securing Healthcare Data Using Squirrel Search Optimization Algorithm.

48. Fusion-based advanced encryption algorithm for enhancing the security of Big Data in Cloud.

49. Key generation method based on reconfigurable intelligent surface in quasi-static scene

50. Optimal pilot length for key generation in correlated wireless channels

Catalog

Books, media, physical & digital resources