Search

Your search keyword '"ADVANCED Encryption Standard"' showing total 4,857 results

Search Constraints

Start Over You searched for: Descriptor "ADVANCED Encryption Standard" Remove constraint Descriptor: "ADVANCED Encryption Standard"
4,857 results on '"ADVANCED Encryption Standard"'

Search Results

2. Design of decryption process for advanced encryption standard algorithm in system-on-chip.

3. Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis.

4. SPIMulator: A Spintronic Processing-in-memory Simulator for Racetracks.

5. Elliptic Curve Cryptography and Password Based Key Derivation Function with Advanced Encryption Standard Method for Cloud Data Security.

6. Fuzzy enhanced location aware secure multicast routing protocol for balancing energy and security in wireless sensor network.

7. Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing.

8. SDESA: secure cloud computing with gradient deep belief network and congruential advanced encryption.

9. Tailoring AES for resource-constrained IoT devices.

10. Satellite image encryption using 2D standard map and advanced encryption standard with scrambling.

11. Developing a secure voice recognition service on Raspberry Pi.

12. Face Mask Detection using CNN: A Fusion of Cryptography and Blockchain.

13. PILEA, an Advanced Hybrid Lightweight Algorithm utilizing Logical Mathematical Functions and Chaotic Systems.

14. Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns.

15. Data privacy based on two-stage adaptive Morse algorithm.

16. A non-redundant cost-effective platform and data security in cloud computing using improved lightweight standalone framework over data encryption standard algorithm.

17. THE RACE FOR ADVANCED ENCRYPTION.

18. Comprehensive Analysis of Internet Security Protocols and Standards for Enhanced Network Safety.

19. An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials.

20. Enhanced Message Authentication Encryption Scheme Based on Physical- Layer Key Generation in Resource-Limited Internet of Things.

21. A Parallel Image Encryption Method Based on Hybrid Chaotic Technique.

22. Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications.

23. Digital-Signature Oriented Steganography Approach against Man-in-the-Middle Attack.

24. Application of optimizing advanced encryption standard encryption algorithm in secure communication of vehicle controller area network bus.

25. Compact Walsh–Hadamard Transform-Driven S-Box Design for ASIC Implementations.

26. Leveraging Grover’s Algorithm for Quantum Searchable Encryption in Cloud Infrastructure and its application in AES Resource Estimation.

27. Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem.

28. Low-power secure caching strategy for Internet of vehicles.

29. Enhancing AES Security through Advanced S-Box Design: Strategies and Solutions.

30. Advancing cryptographic security: a novel hybrid AES-RSA model with byte-level tokenization.

31. Semantic IoT Transformation: Elevating Wireless Networking Performance through Innovative Communication Paradigms.

32. Design of a Low-Power Cryptographic Accelerator Under Advanced Encryption Standard.

33. A Highly Efficient, Modular and Portable FPGA Implementation of AES Cryptography.

34. Efficient Hybrid Encryption Algorithm for Securing Data in Cloud Environment.

35. Supply chain management with secured data transmission via improved DNA cryptosystem.

36. Multi-Keyword Ranked Search in Cloud Environment.

37. DTR-SHIELD: Mutual Synchronization for Protecting against DoS Attacks on the SHIELD Protocol with AES-CTR Mode.

38. Symmetry Analysis in Construction Two Dynamic Lightweight S-Boxes Based on the 2D Tinkerbell Map and the 2D Duffing Map.

39. A method to mitigate cyber exploits on automatic dependent surveillance-broadcast (ADS-B) data transmissions.

40. “Implementing a Secure Mobile Application for Cardless Transactions using QR Code and Hybrid AES-ECC Encryption”.

41. An efficient controller-based architecture for AES algorithm using FPGA.

42. Securing Communication in Internet of Vehicles using Collaborative Cryptography and Intelligent Reflecting Surfaces.

43. Multiple image watermarking with dual authentication for smart and safe city environment.

44. Preserving Confidential Data Using Improved Rivest-Shamir Adleman to Secure Multi-Cloud.

45. 5G enabled IoT network and security in healthcare.

46. A secure and cost effective platform for employee management system using lightweight standalone framework over message digest 5 algorithm.

47. Power Consumption Modelling for Symmetric Block Encryption Algorithms

48. Secure Mobile Payment Gateway for Higher Institutions of Learning

49. Enhanced AES for Securing Hand Written Signature Using Residue Number System

50. 256-Bit AES Encryption Using SubBytes Blocks Optimisation

Catalog

Books, media, physical & digital resources