Showing 1 - 20 results of 1,026 for search 'secure has algorithm 3', query time: 0.18s Refine Results
  1. 1

    Boolean semiring key-exchange with BLAKE3 security (BKEX-B3) by Alvary Kefas Kwala, Alpna Mishra, Shri Kant

    Published 2025-07-01
    “…This work presents a new Boolean Semiring Key Exchange Protocol combined with BLAKE3 cryptographic hash function (BKEX-B3). The protocol leverages the flexibility of BLAKE3’s eXtendable Output Function (XOF) and the nonlinearity of Boolean algebra to produce a flexible, quantum-resistant solution capable of dynamically adapting security levels to advancement in quantum algorithms. …”
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Voice Security Using Hybrid Algorithm by Alyaa Abdul Majeed Haleem

    Published 2010-12-01
    “…High security algorithm was achieved using three layers to make it difficult to break by attacker. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8

    Data Security Model Using (AES-LEA) Algorithms for WoT Environment by Zinah A. Al-jazaeri, Joolan Rokan Naif, Ahmad Mohamad Ghandour

    Published 2025-06-01
    “…This paper presents a new hybrid method for the encryption of information to be more suitable for embedded devices in the WoT environment by modifying the Advanced Encryption Standard AES algorithm and hybridizing it with the Lightweight Encryption Algorithm LEA algorithm as well as the Secure Hash Algorithm version 3 SHA3-256 algorithm for integrity and using four dimensional-NSJR system for generation of chaos keys. …”
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Cloud Data Security through BB84 Protocol and Genetic Algorithm by Jaydip Kumar, Vipin Saxena

    Published 2022-12-01
    “…BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. …”
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Internet of Things Security Detection Technology Based on Grey Association Decision Algorithm by Jie Chang, Xiaojun Zuo, Botao Hou, Lipeng Shi, Guanghua Zhang

    Published 2021-01-01
    “…As a real-time dynamic system of the Internet of Things, the use of grey correlation method to analyze its network security status has good operability and practical value. …”
    Get full text
    Article
  17. 17

    Secure Data Transmission Using GS3 in an Armed Surveillance System by Francisco Alcaraz-Velasco, José M. Palomares, Fernando León-García, Joaquín Olivares

    Published 2025-06-01
    “…Thus, this work bridges this gap by proposing a secure data transmission system integrating a lightweight security scheme named GS3. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20