An intelligent buffalo-based secure edge-enabled computing platform for heterogeneous IoT network in smart cities
The Internet of Things (IoT) based smart city applications are the latest technology-driven
solutions designed to collect and analyze data to enhance the quality of life for urban …
solutions designed to collect and analyze data to enhance the quality of life for urban …
[HTML][HTML] Enhancement of tiny encryption algorithm for resource-constrained WSNs using four connected additive fibonacci generators
AH Zyara, HI Mhaibes… - Journal of Cyber …, 2024 - journals.riverpublishers.com
The usage of wireless sensor networks (WSN) is widespread in industries where data
security is crucial. Due to the energy and computational limits of WSN, the cryptographic …
security is crucial. Due to the energy and computational limits of WSN, the cryptographic …
Image encryption using One Dimensional Chaotic Map and transmission Through OFDM system
It is important to prevent unauthorized access to data whether it is being transferred over a
wireless network or stored on a personal computer. The incorporation of secure and highly …
wireless network or stored on a personal computer. The incorporation of secure and highly …
POGIL Learning Model--Metaphorming for Mobile-Based Cryptography Creation.
A Nasution, M Arpan, E Putri - International Journal of …, 2024 - search.ebscohost.com
The cryptography course has a mathematical basis and involves programming algorithms in
the creation process while the implementation utilizes a programming language …
the creation process while the implementation utilizes a programming language …
OFDM Transmission for encrypted Images based on 3D Chaotic Map and S-Box through Fading Channel
It is important to prevent unauthorized access to data whether it is being transferred over a
wireless network or stored on a personal computer. This paper proposed a 3D chaotic map …
wireless network or stored on a personal computer. This paper proposed a 3D chaotic map …
МОДИФІКАЦІЯ КРИПТОГРАФІЧНОГО АЛГОРИТМУ А5/1 ДЛЯ ЗАБЕЗПЕЧЕННЯ КОМУНІКАЦІЙ ПРИСТРОЇВ IOT
В Корнієць, Р Черненко - Електронне фахове наукове …, 2023 - csecurity.kubg.edu.ua
Анотація Мережі інтернету речей є високо диверсифікованими з точки зору великої
кількості пристроїв з різними характеристиками, операційних систем, алгоритмів …
кількості пристроїв з різними характеристиками, операційних систем, алгоритмів …
[PDF][PDF] Image encryption based on s-box and 3D-chaotic maps and secure image transmission through ofdm in rayleigh fading channel
Technology in processing images and communication networks has significantly developed
in recent years. Safeguarding sensitive data in both wired and wireless communications is of …
in recent years. Safeguarding sensitive data in both wired and wireless communications is of …
[PDF][PDF] Дисертація «Моделі та методи забезпечення захисту інформації, що передається відкритими каналами в мережах інтернету речей»
РМ Черненко - 2024 - elibrary.kubg.edu.ua
КИЇВСЬКИЙ СТОЛИЧНИЙ УНІВЕРСИТЕТ ІМЕНІ БОРИСА ГРІНЧЕНКА Кваліфікацій
Page 1 КИЇВСЬКИЙ СТОЛИЧНИЙ УНІВЕРСИТЕТ ІМЕНІ БОРИСА ГРІНЧЕНКА …
Page 1 КИЇВСЬКИЙ СТОЛИЧНИЙ УНІВЕРСИТЕТ ІМЕНІ БОРИСА ГРІНЧЕНКА …
[HTML][HTML] 2 Structure of Paper
AH Zyara, HI Mhaibes, QM Shallal - journals.riverpublishers.com
Section 3 examines the literature review. Section 4 presents the theoretical background of
AFG and TEA. Section 5 explains the design and implementation of the proposed work. The …
AFG and TEA. Section 5 explains the design and implementation of the proposed work. The …