-
121
Eigenvalues of Relatively Prime Graphs Connected with Finite Quasigroups
Published 2024-01-01“…Spectral graph theory plays a very important role in understanding certifiable applications such as cryptography, combinatorial design, and coding theory. …”
Get full text
Article -
122
Comparative Study of Generalized Quantitative-Qualitative Inaccuracy Fuzzy Measures for Noiseless Coding Theorem and 1:1 Codes
Published 2015-01-01“…In coding theory, we study various properties of codes for application in data compression, cryptography, error correction, and network coding. The study of codes is introduced in Information Theory, electrical engineering, mathematics, and computer sciences for the transmission of data through reliable and efficient methods. …”
Get full text
Article -
123
An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks
Published 2015-09-01“…In this paper, RSA-like public key cryptography is employed to design a mechanism for multiuser broadcast authentication in WSNs. …”
Get full text
Article -
124
-
125
A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding
Published 2017-01-01“…Chaotic maps have good potential in security applications due to their inherent characteristics relevant to cryptography. This paper introduces a new audio cryptosystem based on chaotic maps, hybrid chaotic shift transform (HCST), and deoxyribonucleic acid (DNA) encoding rules. …”
Get full text
Article -
126
Low Mismatch Key Agreement Based on Wavelet-Transform Trend and Fuzzy Vault in Body Area Network
Published 2013-06-01“…With limitations of power and computation capabilities, one of the main challenges to ensure security in BAN is how to generate or distribute a shared key between nodes for lightweight symmetric cryptography. The current research almost exploits the randomness and distinctiveness (characteristics) of physiological signals to solve the key generation problem. …”
Get full text
Article -
127
Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
Published 2012-12-01“…Recent research efforts have shown that NC can be combined with classical error control codes and cryptography for secure communications or misbehavior detections. …”
Get full text
Article -
128
Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks
Published 2013-04-01“…When nodes may be compromised, “beyond cryptography” algorithmic solutions must be envisaged to complement the cryptographic solutions. …”
Get full text
Article -
129
An efficient construction of key-dependent substitution box based on chaotic sine map
Published 2019-12-01“…Moreover, the confusion and diffusion properties of cryptography can be achieved by chaos. This article introduces an efficient construction of a key-dependent substitution box based on the mixing property of the chaotic sine map. …”
Get full text
Article -
130
eDAAAS: Efficient distributed anonymous authentication and access in smart homes
Published 2016-12-01“…In this article, we propose an authentication scheme based on symmetric key cryptography, combined with a capability-based access control system, to provide the different stakeholders (residents, recurring guests, or temporary guests) end-to-end secure access to the Internet of Things devices in a smart home, managed by the home owner in an anonymous way. …”
Get full text
Article -
131
An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment
Published 2015-01-01“…This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. …”
Get full text
Article -
132
Encoding and Decoding of Secret Messages Using Matrices.
Published 2023“…Due to the great need of security for passing sensitive information from one person to another or from one organization to another through electronic technology, there is need for cryptography as a solution to this problem. Matrix analysis of one sort or another has for the past century been used in a variety of disciplines to summarize complex aspects of knowledge generation and to provide an eagle's eye perspective of them. …”
Get full text
Thesis -
133
Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS
Published 2016-01-01“…The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. …”
Get full text
Article -
134
On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory
Published 2024-03-01“…As a novel trend in the world of cryptography, non-classical integer systems, such as neutrosophic or plithogenic integers, are used for encryption and decryption. …”
Get full text
Article -
135
Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users
Published 2025-01-01“…In order to address these issues, this study proposes an integrated approach combining elliptic curve digital signatures with hash functions for data integrity and authentication, Paillier cryptography for confidentiality, and calibrated noise for privacy preservation. …”
Get full text
Article -
136
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing
Published 2016-01-01“…Logistic map-based chaotic cryptography algorithm is used to preserve the privacy of outsourcing data, which has a fast operation speed and a good effect of encryption. …”
Get full text
Article -
137
Software defined network implementation of multi-node adaptive novel quantum key distribution protocol
Published 2024-09-01“…For securing communication, a commonly know technique is to use cryptography and public channels. Engineers have been working to create a better and more secure cryptographic system. …”
Get full text
Article -
138
Investigation of Blockchain Technology by Using the Innovative Concepts of Complex Pythagorean Fuzzy Soft Information
Published 2022-01-01“…A blockchain is a valuable and proficient type of digital ledger technology that involves of expanding list of records, called blocks, that are strongly connected simultaneously using cryptography. Further, complex Pythagorean fuzzy sets (CPFSs) are the generalized form of the intuitionistic fuzzy sets (IFSs), Pythagorean fuzzy sets (PyFSs), and complex intuitionistic fuzzy sets (CIFSs), used for evaluating the awkward and unreliable information in genuine life problems. …”
Get full text
Article -
139
Construction of Mutually Orthogonal Graph Squares Using Novel Product Techniques
Published 2022-01-01“…Mutually orthogonal graph squares are an area of combinatorial design theory that has many applications in optical communications, wireless communications, cryptography, storage system design, algorithm design and analysis, and communication protocols, to mention just a few areas. …”
Get full text
Article -
140
Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks
Published 2012-04-01“…To overcome the limitation caused by the symmetric key cryptography algorithms for securing data in WSNs, we proposed a mechanism for checking data integrity in a balanced energy network backbone. …”
Get full text
Article