Showing 121 - 140 results of 176 for search '"Cryptography"', query time: 0.05s Refine Results
  1. 121

    Eigenvalues of Relatively Prime Graphs Connected with Finite Quasigroups by Muhammad Nadeem, Nwazish Ali, Hafiz Muhammad Bilal, Md. Ashraful Alam, M. I. Elashiry, Kholood Alnefaie

    Published 2024-01-01
    “…Spectral graph theory plays a very important role in understanding certifiable applications such as cryptography, combinatorial design, and coding theory. …”
    Get full text
    Article
  2. 122

    Comparative Study of Generalized Quantitative-Qualitative Inaccuracy Fuzzy Measures for Noiseless Coding Theorem and 1:1 Codes by H. D. Arora, Anjali Dhiman

    Published 2015-01-01
    “…In coding theory, we study various properties of codes for application in data compression, cryptography, error correction, and network coding. The study of codes is introduced in Information Theory, electrical engineering, mathematics, and computer sciences for the transmission of data through reliable and efficient methods. …”
    Get full text
    Article
  3. 123

    An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks by Chen-Yang Cheng, Iuon-Chang Lin, Shu-Yan Huang

    Published 2015-09-01
    “…In this paper, RSA-like public key cryptography is employed to design a mechanism for multiuser broadcast authentication in WSNs. …”
    Get full text
    Article
  4. 124
  5. 125

    A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding by S. J. Sheela, K. V. Suresh, Deepaknath Tandur

    Published 2017-01-01
    “…Chaotic maps have good potential in security applications due to their inherent characteristics relevant to cryptography. This paper introduces a new audio cryptosystem based on chaotic maps, hybrid chaotic shift transform (HCST), and deoxyribonucleic acid (DNA) encoding rules. …”
    Get full text
    Article
  6. 126

    Low Mismatch Key Agreement Based on Wavelet-Transform Trend and Fuzzy Vault in Body Area Network by Yang Wu, Yongmei Sun, Lei Zhan, Yuefeng Ji

    Published 2013-06-01
    “…With limitations of power and computation capabilities, one of the main challenges to ensure security in BAN is how to generate or distribute a shared key between nodes for lightweight symmetric cryptography. The current research almost exploits the randomness and distinctiveness (characteristics) of physiological signals to solve the key generation problem. …”
    Get full text
    Article
  7. 127

    Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding by Jen-Yeu Chen, Yi-Ying Tseng

    Published 2012-12-01
    “…Recent research efforts have shown that NC can be combined with classical error control codes and cryptography for secure communications or misbehavior detections. …”
    Get full text
    Article
  8. 128

    Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks by Wassim Znaidi, Marine Minier, Stéphane Ubéda

    Published 2013-04-01
    “…When nodes may be compromised, “beyond cryptography” algorithmic solutions must be envisaged to complement the cryptographic solutions. …”
    Get full text
    Article
  9. 129

    An efficient construction of key-dependent substitution box based on chaotic sine map by Muhammad Usama, Osama Rehman, Imran Memon, Safdar Rizvi

    Published 2019-12-01
    “…Moreover, the confusion and diffusion properties of cryptography can be achieved by chaos. This article introduces an efficient construction of a key-dependent substitution box based on the mixing property of the chaotic sine map. …”
    Get full text
    Article
  10. 130

    eDAAAS: Efficient distributed anonymous authentication and access in smart homes by An Braeken, Pawani Porambage, Milos Stojmenovic, Lambros Lambrinos

    Published 2016-12-01
    “…In this article, we propose an authentication scheme based on symmetric key cryptography, combined with a capability-based access control system, to provide the different stakeholders (residents, recurring guests, or temporary guests) end-to-end secure access to the Internet of Things devices in a smart home, managed by the home owner in an anonymous way. …”
    Get full text
    Article
  11. 131

    An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment by Sudha Devi Dorairaj, Thilagavathy Kaliannan

    Published 2015-01-01
    “…This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. …”
    Get full text
    Article
  12. 132

    Encoding and Decoding of Secret Messages Using Matrices. by Niwagaba, James

    Published 2023
    “…Due to the great need of security for passing sensitive information from one person to another or from one organization to another through electronic technology, there is need for cryptography as a solution to this problem. Matrix analysis of one sort or another has for the past century been used in a variety of disciplines to summarize complex aspects of knowledge generation and to provide an eagle's eye perspective of them. …”
    Get full text
    Thesis
  13. 133

    Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS by Kefei Mao, Jianwei Liu, Jie Chen

    Published 2016-01-01
    “…The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. …”
    Get full text
    Article
  14. 134

    On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory by Mohammad Abobala, Hasan Sankari, Mohamed Zeina

    Published 2024-03-01
    “…As a novel trend in the world of cryptography, non-classical integer systems, such as neutrosophic or plithogenic integers, are used for encryption and decryption. …”
    Get full text
    Article
  15. 135

    Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users by Vanga Anil, S. L. Arun

    Published 2025-01-01
    “…In order to address these issues, this study proposes an integrated approach combining elliptic curve digital signatures with hash functions for data integrity and authentication, Paillier cryptography for confidentiality, and calibrated noise for privacy preservation. …”
    Get full text
    Article
  16. 136

    A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing by Xinyue Cao, Zhangjie Fu, Xingming Sun

    Published 2016-01-01
    “…Logistic map-based chaotic cryptography algorithm is used to preserve the privacy of outsourcing data, which has a fast operation speed and a good effect of encryption. …”
    Get full text
    Article
  17. 137

    Software defined network implementation of multi-node adaptive novel quantum key distribution protocol by Hardeer Kaur, Jai Sukh Paul Singh

    Published 2024-09-01
    “…For securing communication, a commonly know technique is to use cryptography and public channels. Engineers have been working to create a better and more secure cryptographic system. …”
    Get full text
    Article
  18. 138

    Investigation of Blockchain Technology by Using the Innovative Concepts of Complex Pythagorean Fuzzy Soft Information by Naeem Jan, Jeonghwan Gwak, Younghoon Jeon, Bushra Akram

    Published 2022-01-01
    “…A blockchain is a valuable and proficient type of digital ledger technology that involves of expanding list of records, called blocks, that are strongly connected simultaneously using cryptography. Further, complex Pythagorean fuzzy sets (CPFSs) are the generalized form of the intuitionistic fuzzy sets (IFSs), Pythagorean fuzzy sets (PyFSs), and complex intuitionistic fuzzy sets (CIFSs), used for evaluating the awkward and unreliable information in genuine life problems. …”
    Get full text
    Article
  19. 139

    Construction of Mutually Orthogonal Graph Squares Using Novel Product Techniques by A. El-Mesady, Omar Bazighifan

    Published 2022-01-01
    “…Mutually orthogonal graph squares are an area of combinatorial design theory that has many applications in optical communications, wireless communications, cryptography, storage system design, algorithm design and analysis, and communication protocols, to mention just a few areas. …”
    Get full text
    Article
  20. 140

    Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks by Imanishimwe Jean de Dieu, Nyirabahizi Assouma, Maniraguha Muhamad, Wang Jin, Sungyoung Lee

    Published 2012-04-01
    “…To overcome the limitation caused by the symmetric key cryptography algorithms for securing data in WSNs, we proposed a mechanism for checking data integrity in a balanced energy network backbone. …”
    Get full text
    Article