Search

Your search keyword '"symmetric encryption"' showing total 249 results

Search Constraints

Start Over You searched for: Descriptor "symmetric encryption" Remove constraint Descriptor: "symmetric encryption" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
249 results on '"symmetric encryption"'

Search Results

1. Strong s-box construction approach based on Josephus problem.

2. Enhancing AES Security through Advanced S-Box Design: Strategies and Solutions.

3. An efficient controller-based architecture for AES algorithm using FPGA.

4. Reversible Cellular Automata Based Cryptosystem.

5. A new S-box generator algorithm based on chaos and cellular automata.

6. Color Image Encryption Based on a Novel Fourth-Direction Hyperchaotic System.

7. 基于动态密钥的车载以太网安全通信方法.

8. A new algorithm to generate aes-like substitution boxes based on sine cosine optimization algorithm.

9. Enhancing Multimedia Security Using Shortest Weight First Algorithm and Symmetric Cryptography.

10. Advancing IoT Device Security in Smart Cities: Through Innovative Key Generation and Distribution With D_F, Gf, and Multi-Order Recursive Sequences.

11. Binary-Tree-Fed Mixnet: An Efficient Symmetric Encryption Solution.

12. Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control.

13. Design of Protection Software Using Some Cryptosystems for Cloud Database Files.

14. Hybridized Cryptographic Encryption and Decryption Using Advanced Encryption Standard and Data Encryption Standard

15. A Novel Eighth-Order Hyperchaotic System and Its Application in Image Encryption.

16. USING WEBPAGES AS CRYPTOGRAPHIC KEYS IN A ONE-TIME PAD SYSTEM

17. Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem.

18. 一种嵌入式设备固件安全更新方案.

19. An enhanced reversible data hiding algorithm using deep neural network for E-healthcare.

20. Lightweight Encryption at end nodes with PRESENT-80/128 ISO/IEC 29192 standard.

21. IDEA: Algoritmo Criptográfico Simétrico para la Protección Segura de Datos Sensibles.

22. A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique.

23. Evaluation of a Modular Approach to AES Hardware Architecture and Optimization.

24. Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks

25. Incentive Mechanism for Continuous Crowd Sensing Based Symmetric Encryption and Double Truth Discovery

26. Quantum encryption in phase space with displacement operators.

27. PudgyTurtle Mode Resists Bit-Flipping Attacks.

28. A Lightweight and Robust Stream Cipher Based on PI for Intelligent Transportation Systems.

29. A Chunked and Disordered Data Privacy Protection Algorithm: Application to Resource Platform Systems.

30. Effective electrocardiogram steganography for secured patient information transmission based on most significant bit planes prediction.

31. Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary.

32. USING WEBPAGES AS CRYPTOGRAPHIC KEYS IN A ONE-TIME PAD SYSTEM.

33. Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control

34. Binary-Tree-Fed Mixnet: An Efficient Symmetric Encryption Solution

35. Cryptographic Algorithm Based on Hybrid One-Dimensional Cellular Automata.

36. Quantum encryption of superposition states with quantum permutation pad in IBM quantum computers.

37. Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks.

38. Hybrid encryption prototype combining AES and RSA encryption methods.

39. ENCRYPTED CLASSIFIED VOICE INFORMATION AND THE MANAGEMENT OF ITS SUSTAINABILITY

41. Quantum encryption with quantum permutation pad in IBMQ systems.

42. A Review of the Blowfish Algorithm Modifications in Terms of Execution Time and Security.

43. A Novel Eighth-Order Hyperchaotic System and Its Application in Image Encryption

44. An Efficient Identification Scheme Based on Bivariate Function Hard Problem.

45. Mobil Uyumlu Çoklu Dil Destekli Hibrit Şifreleme Algoritması.

46. A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis.

47. An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks.

48. Security Verification of Social Network Model Using Improved Three-Party Authenticated Key Exchange Protocol.

49. SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing.

50. Lightweight anonymous authentication and key agreement protocols for mobile edge computing.

Catalog

Books, media, physical & digital resources