-
1
Boolean semiring key-exchange with BLAKE3 security (BKEX-B3)
Published 2025-07-01“…This work presents a new Boolean Semiring Key Exchange Protocol combined with BLAKE3 cryptographic hash function (BKEX-B3). The protocol leverages the flexibility of BLAKE3’s eXtendable Output Function (XOF) and the nonlinearity of Boolean algebra to produce a flexible, quantum-resistant solution capable of dynamically adapting security levels to advancement in quantum algorithms. …”
Get full text
Article -
2
-
3
New signcryption algorithm for secure communication of ad hoc networks
Published 2010-01-01Get full text
Article -
4
Voice Security Using Hybrid Algorithm
Published 2010-12-01“…High security algorithm was achieved using three layers to make it difficult to break by attacker. …”
Get full text
Article -
5
Generating diversity and securing completeness in algorithmic retrosynthesis
Published 2025-05-01Get full text
Article -
6
Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
Published 2008-01-01Get full text
Article -
7
-
8
Data Security Model Using (AES-LEA) Algorithms for WoT Environment
Published 2025-06-01“…This paper presents a new hybrid method for the encryption of information to be more suitable for embedded devices in the WoT environment by modifying the Advanced Encryption Standard AES algorithm and hybridizing it with the Lightweight Encryption Algorithm LEA algorithm as well as the Secure Hash Algorithm version 3 SHA3-256 algorithm for integrity and using four dimensional-NSJR system for generation of chaos keys. …”
Get full text
Article -
9
A Reliable Application of MPC for Securing the Tri-Training Algorithm
Published 2023-01-01Get full text
Article -
10
An Enhanced and Adaptive Algorithm for Secure Encryption of Data using Advanced Encryption
Published 2025-08-01Get full text
Article -
11
Performance comparison of different algorithms to secure the information for Wireless sensor Network
Published 2024-01-01Get full text
Article -
12
Robust resource allocation algorithm for multicarrier NOMA security communication system
Published 2022-03-01Get full text
Article -
13
Cloud Data Security through BB84 Protocol and Genetic Algorithm
Published 2022-12-01“…BB84 protocol is the first quantum cryptography protocol developed by Bennett and Brassard in the year 1984. In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. …”
Get full text
Article -
14
Network Efficient Hierarchical Authentication Algorithm for Secure Communication in IoT and IoE
Published 2024-01-01Get full text
Article -
15
Security in Post-Quantum Era: A Comprehensive Survey on Lattice-Based Algorithms
Published 2025-01-01Get full text
Article -
16
Internet of Things Security Detection Technology Based on Grey Association Decision Algorithm
Published 2021-01-01“…As a real-time dynamic system of the Internet of Things, the use of grey correlation method to analyze its network security status has good operability and practical value. …”
Get full text
Article -
17
Secure Data Transmission Using GS3 in an Armed Surveillance System
Published 2025-06-01“…Thus, this work bridges this gap by proposing a secure data transmission system integrating a lightweight security scheme named GS3. …”
Get full text
Article -
18
Secure data collection method of WSN based on mobile Sink
Published 2021-02-01Get full text
Article -
19
Network security traffic detection and legal supervision based on adaptive metric learning algorithm
Published 2025-09-01Get full text
Article -
20
The A New Strategy to Enhance the Security of GPS Location by PGP Algorithm in Smart Containers
Published 2022-06-01Get full text
Article