Search

Your search keyword '"Key generation"' showing total 4,164 results

Search Constraints

Start Over You searched for: Descriptor "Key generation" Remove constraint Descriptor: "Key generation"
4,164 results on '"Key generation"'

Search Results

1. A Novel Key Generation Algorithm Utilizing Lattice-Based Cryptography Principles

2. A modified RC‐4 cryptosystems to enhance security by using negative key schedule.

3. An Enhanced Elliptic Curve Cryptography Scheme for Secure Data Transmission to Evade Entailment of Fake Vehicles in VANET.

4. Enhancing the SRAM PUF with an XOR Gate.

5. CCM-PRNG: Pseudo-random bit generator based on cross-over chaotic map and its application in image encryption.

6. Leveraging generative adversarial networks for enhanced cryptographic key generation.

7. An innovative image encryption algorithm enhanced with the Pan-Tompkins Algorithm for optimal security.

8. HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment.

9. A Novel High-Speed Data Encryption Scheme for Internet of Medical Things Using Modified Elliptic Curve Diffie–Hellman and Advance Encryption Standard.

10. An Approach of Modified IDEA with 1024 Bits Key to Enhance Security and Efficiency of Data Transmission in the Healthcare Sector

11. Key Generation and Testing Based on Biometrics

12. A novel authentication scheme for secure data sharing in IoT enabled agriculture.

13. Hybrid KuFaI: A novel secure key generation algorithm using fast independent component analysis for physical layer security techniques.

14. Study of Network Security Based on Key Management System for In-Vehicle Ethernet.

15. Dynamic Approach for Time Reduction in RSA Algorithm through Adaptive Data Encryption and Decryption.

16. SSKA: secure symmetric encryption exploiting Kuznyechik algorithm for trustworthy communication.

17. Image encryption with leveraging blockchain-based optimal deep learning for Secure Disease Detection and Classification in a smart healthcare environment.

18. Enhancing Data Security through Machine Learning-based Key Generation and Encryption.

19. Strengthening Industrial IoT Security with Integrated PUF Token

20. Secure Private Data Storage and File Sharing Using Homomorphic and Hybrid Hash-Based Cryptographic Technique in Cloud

21. Securing Asymmetric Key Cryptography in 6G Wireless and Mobile Environments: A Comprehensive Review and Proposed Hybrid Cryptosystem

22. Biometric-Based Key Handling Using Variation to Scale Invariant Feature Transform amid COVID-19 Pandemic

23. Driving Training-Based Optimization-Enabled Key Generation Approach for Secure and Efficient Authentication with Data Sharing Approach in IoT Healthcare

24. IoT Node Authentication Using Du-KAuth with Strong Access Control Model in Smart City Application

25. PrimeSwitch—Encryption and Decryption Algorithm Using RSA Key Generation

26. A Federated Algorithm for the Lightweight Generation of High-Entropy Keys in Distributed Computing Systems

27. PalmKeyNet: Palm Template Protection Based on Multi-modal Shared Key

28. Image encryption with leveraging blockchain-based optimal deep learning for Secure Disease Detection and Classification in a smart healthcare environment

29. Decentralized blockchain-based security enhancement with lamport merkle digital signature generation and optimized encryption in cloud environment.

30. A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm.

31. AUDIO ENCRYPTION AND DECRYPTION USING AES ALGORITHM TECHNIQUE.

32. An Improved Lightning Search Algorithm-based End-to-End Lightweight Partially Homomorphic Encryption Approach for Enhanced IoT Security

33. A framework for application-centric Internet of Things authentication

34. Improving Digital Forensic Security: A Secure Storage Model With Authentication and Optimal Key Generation Based Encryption

35. Enhancing the SRAM PUF with an XOR Gate

40. Wireless channel-based ciphering key generation: effect of aging and treatment.

41. Seagull Optimization Algorithm with Share Creation with an Image Encryption Scheme for Secure Vehicular Ad Hoc Networks.

42. A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud.

43. A fuzzy optimal lightweight convolutional neural network for deduplication detection in cloud server.

44. An Efficient Multi Biometric Crypto-Key Generation.

45. Enhancing Security in Online Voting Systems: A Cryptographic Approach Utilizing Galois Fields.

46. SolarKey: Battery-free Key Generation Using Solar Cells.

47. A Low Bit Instability CMOS PUF Based on Current Mirrors and WTA Cells.

48. SPIN: Leveraging Fuzzy Commitment and LDPC Sum-Product Decoder for Key Generation from Face

49. Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios

Catalog

Books, media, physical & digital resources