Showing 1 - 20 results of 32 for search 'multiple levels encryption algorithm', query time: 0.28s Refine Results
  1. 1

    Encryption time (sec). by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  2. 2

    Encryption time (sec). by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  3. 3

    Encryption throughput (Byte/sec). by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  4. 4

    Encryption throughput (Kb/sec). by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  5. 5

    A sample of original dataset. by Tamer Abdel Latif Ali (21464041)

    Published 2025
    “…Multi-stage deception (MSD) methods leverage multiple deception strategies, such as complement, swapping, and stack reversal, to improve data protection levels and resistance against decryption attempts. …”
  6. 6

    Attributes classification based on MSD. by Tamer Abdel Latif Ali (21464041)

    Published 2025
    “…Multi-stage deception (MSD) methods leverage multiple deception strategies, such as complement, swapping, and stack reversal, to improve data protection levels and resistance against decryption attempts. …”
  7. 7

    Privacy-preserving techniques evaluation. by Tamer Abdel Latif Ali (21464041)

    Published 2025
    “…Multi-stage deception (MSD) methods leverage multiple deception strategies, such as complement, swapping, and stack reversal, to improve data protection levels and resistance against decryption attempts. …”
  8. 8

    A sample of the dataset after applying MSD. by Tamer Abdel Latif Ali (21464041)

    Published 2025
    “…Multi-stage deception (MSD) methods leverage multiple deception strategies, such as complement, swapping, and stack reversal, to improve data protection levels and resistance against decryption attempts. …”
  9. 9

    Comparison of cryptographic systems [66,67]. by Panagiotis Mougkogiannis (17002143)

    Published 2025
    “…The encryption process uses modular multiplication: . This changes plaintext into ciphertext. …”
  10. 10

    Overview of LWLCM. by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  11. 11

    Key initialization. by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  12. 12

    Decryption Time(sec). by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  13. 13

    Key-Keystream Avalanche effect. by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  14. 14

    Memory usage (Kb). by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  15. 15

    Key-Cipher Text Avalanche effect. by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  16. 16

    Average Avalanche effect for Key-Cipher text. by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  17. 17

    Bifurcation diagram of logistic map. by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  18. 18

    Decryption time (sec). by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  19. 19

    A comparative analysis of existing work. by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  20. 20

    Key issues with traditional cryptography. by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”