-
1
Security testing and evaluation of cryptography algorithms. (c2003)
منشور في 2003احصل على النص الكامل
احصل على النص الكامل
masterThesis -
2
-
3
A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks
منشور في 2023الموضوعات: -
4
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
منشور في 2023"…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …"
-
5
A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes
منشور في 2022"…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …"
-
6
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
-
7
Scrambled Prime Key Encryption
منشور في 2018"…Nevertheless, but the fast increase in computers' speed may threaten these algorithms. This paper presents an innovative symmetric encryption, which we call Scrambled Prime Key Encryption or SPKE that tries to heighten the level of communication security. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
8
Axes-Based Encryption Key
منشور في 2018احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
9
A decoding algorithm for I-Q space-time coded systems in fadingenvironments
منشور في 2000"…Simulation results showed that I-Q ST codes with the new algorithm provide coding gains over ST codes having the same complexity but with a single encoder…"
احصل على النص الكامل
احصل على النص الكامل
article -
10
-
11
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
منشور في 2024"…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …"
-
12
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
منشور في 2019"…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
-
13
-
14
-
15
Improving the security of SNMP in wireless networks
منشور في 2017"…SNMPv1 and v2 do not provide security when managing agents. Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
16
CNN and HEVC Video Coding Features for Static Video Summarization
منشور في 2022"…During coding, 64 proposed features were generated from the coder for each frame. …"
احصل على النص الكامل
article -
17
LNCRI: Long Non-Coding RNA Identifier in Multiple Species
منشور في 2021"…<p>The pervasive nature of long non-coding RNA (lncRNA) transcription in the mammalian genomes has changed our protein-centric view of genomes. …"
-
18
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
منشور في 2005"…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
19
Generating haptic texture using solid noise
منشور في 2021"…In computer haptics, texture can render environments more realistic and provide useful information. In this paper, an algorithm is proposed for virtual texture simulation by using solid noise, where only a few parameters need to be altered to generate a range of realistic and diverse textures by reproducing different frequencies similar to that of real vibrational signals in a virtual environment. …"
-
20
Secure and Anonymous Communications Over Delay Tolerant Networks
منشور في 2020"…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …"