Search

Your search keyword '"Key generation"' showing total 400 results

Search Constraints

Start Over You searched for: Descriptor "Key generation" Remove constraint Descriptor: "Key generation" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
400 results on '"Key generation"'

Search Results

1. A modified RC‐4 cryptosystems to enhance security by using negative key schedule.

2. An Enhanced Elliptic Curve Cryptography Scheme for Secure Data Transmission to Evade Entailment of Fake Vehicles in VANET.

3. Enhancing the SRAM PUF with an XOR Gate.

4. CCM-PRNG: Pseudo-random bit generator based on cross-over chaotic map and its application in image encryption.

5. Leveraging generative adversarial networks for enhanced cryptographic key generation.

6. An innovative image encryption algorithm enhanced with the Pan-Tompkins Algorithm for optimal security.

7. HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment.

8. A Novel High-Speed Data Encryption Scheme for Internet of Medical Things Using Modified Elliptic Curve Diffie–Hellman and Advance Encryption Standard.

9. An Approach of Modified IDEA with 1024 Bits Key to Enhance Security and Efficiency of Data Transmission in the Healthcare Sector

10. Key Generation and Testing Based on Biometrics

11. A novel authentication scheme for secure data sharing in IoT enabled agriculture.

12. Hybrid KuFaI: A novel secure key generation algorithm using fast independent component analysis for physical layer security techniques.

13. Study of Network Security Based on Key Management System for In-Vehicle Ethernet.

14. Dynamic Approach for Time Reduction in RSA Algorithm through Adaptive Data Encryption and Decryption.

15. SSKA: secure symmetric encryption exploiting Kuznyechik algorithm for trustworthy communication.

16. Image encryption with leveraging blockchain-based optimal deep learning for Secure Disease Detection and Classification in a smart healthcare environment.

17. Enhancing Data Security through Machine Learning-based Key Generation and Encryption.

18. Image encryption with leveraging blockchain-based optimal deep learning for Secure Disease Detection and Classification in a smart healthcare environment

19. Decentralized blockchain-based security enhancement with lamport merkle digital signature generation and optimized encryption in cloud environment.

20. A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm.

21. AUDIO ENCRYPTION AND DECRYPTION USING AES ALGORITHM TECHNIQUE.

22. An Improved Lightning Search Algorithm-based End-to-End Lightweight Partially Homomorphic Encryption Approach for Enhanced IoT Security

23. A framework for application-centric Internet of Things authentication

24. Improving Digital Forensic Security: A Secure Storage Model With Authentication and Optimal Key Generation Based Encryption

25. Enhancing the SRAM PUF with an XOR Gate

30. Wireless channel-based ciphering key generation: effect of aging and treatment.

31. Seagull Optimization Algorithm with Share Creation with an Image Encryption Scheme for Secure Vehicular Ad Hoc Networks.

32. A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud.

33. A fuzzy optimal lightweight convolutional neural network for deduplication detection in cloud server.

34. An Efficient Multi Biometric Crypto-Key Generation.

35. Enhancing Security in Online Voting Systems: A Cryptographic Approach Utilizing Galois Fields.

36. SolarKey: Battery-free Key Generation Using Solar Cells.

37. A Low Bit Instability CMOS PUF Based on Current Mirrors and WTA Cells.

38. Generalization of RSA cryptosystem based on 2n primes

39. Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis

40. A Key Based Hybrid Approach for Privacy and Integrity in Multi-Cloud.

41. Maximizing blockchain security: Merkle tree hash values generated through advanced vectorized elliptic curve cryptography mechanisms.

42. Securing the Information using Improved Modular Encryption Standard in Cloud Computing Environment.

43. Novel quantum key distribution and attribute based encryption for cloud data security.

44. Efficient Key Generation Techniques for Wireless Body Area Network.

45. KeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism.

48. Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing

49. Encrypt with Your Mind: Reliable and Revocable Brain Biometrics via Multidimensional Gaussian Fitted Bit Allocation.

50. Deep learning with metaheuristics based data sensing and encoding scheme for secure cyber physical sensor systems.

Catalog

Books, media, physical & digital resources