Search

Your search keyword '"Strong key"' showing total 28 results

Search Constraints

Start Over You searched for: Descriptor "Strong key" Remove constraint Descriptor: "Strong key" Topic encryption Remove constraint Topic: encryption
28 results on '"Strong key"'

Search Results

1. AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT

2. Key regeneration-free ciphertext-policy attribute-based encryption and its application

3. Using Smartphones to Enable Low-Cost Secure Consumer IoT Devices

4. Securing content-centric networks with content-based encryption

5. A lightweight Data Sharing Scheme with Resisting Key Abuse in Mobile Edge Computing

6. Image Encryption Based on DNA Substitution and Chaotic Theory

7. 2D Cosine-coupling-Logistic and Sine map for image encryption

8. A Medical Image Encryption Algorithm Based on Hermite Chaotic Neural Network

9. Speech encryption based on the synchronization of fractional-order chaotic maps

10. Medical image encryption using edge maps

11. Two-Phase Image Encryption Scheme Based on FFCT and Fractals

12. A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT

13. An image encryption algorithm based on the combination of low - dimensional chaos and high - dimensional chaos

14. ECC Based Encryption Algorithm for Lightweight Cryptography

15. Energy Efficient Hierarchical Key Management Protocol

16. A New Hybrid Image Encryption Algorithm Based on 2D-CA, FSM-DNA Rule Generator, and FSBI

17. Electronic Medical Information Encryption Using Modified Blowfish Algorithm

18. Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing

19. DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation

20. Analysis and Implementation of Combined Approach of RSA and ECC Algorithm for Enhanced Data Security

21. A New Color Image Encryption Scheme Based on Chaos

22. How federal agencies can secure their cloud migrations

23. On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures

24. Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes

25. On the equivalence of two security notions for hierarchical key assignment schemes in the unconditional setting

26. A Survey on Cryptographic Algorithms Using Fractal Structures

27. A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations

28. Secret data communication system using steganography, AES and RSA

Catalog

Books, media, physical & digital resources