[HTML][HTML] Cryptographic data security for reliable wireless sensor network
Abstract Wireless Sensor Networks (WSNs) are widely utilized in a variety of applications.
Attackers might interfere with equipment, and eavesdrop on conversations. Attackers can …
Attackers might interfere with equipment, and eavesdrop on conversations. Attackers can …
[PDF][PDF] A survey and analysis of the image encryption methods
OF Mohammad, MSM Rahim… - International Journal of …, 2017 - academia.edu
At the present time, the protection of multimedia data has become a very important process
which can be achieved by encryption. Basically, so many different techniques have been …
which can be achieved by encryption. Basically, so many different techniques have been …
Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography
B Prasanalakshmi, K Murugan, K Srinivasan… - The Journal of …, 2022 - Springer
Data transmission is a great challenge in any network environment. However, medical data
collected from IoT devices need to be transmitted at high speed to ensure that the …
collected from IoT devices need to be transmitted at high speed to ensure that the …
[PDF][PDF] Research on various cryptography techniques
Security plays a critical position in preserving information privacy and secrecy. Many
encryption strategies are available to protect data during transmission or storage. These …
encryption strategies are available to protect data during transmission or storage. These …
Harris Hawk optimization driven adaptive image encryption integrating Hilbert vibrational decomposition and chaos
Image encryption is a technique used to protect the confidentiality of digital images. Existing
encryption algorithms use chaotic maps for generating random sequences. These …
encryption algorithms use chaotic maps for generating random sequences. These …
[HTML][HTML] Security for wireless sensor networks using cryptography
P Ramadevi, S Ayyasamy, Y Suryaprakash… - Measurement …, 2023 - Elsevier
Abstract WSNs (Wireless Sensor Networks) are becoming more and more capable with
each passing day. Widespread usage of WSNs is helping mitigate many dangers. Protecting …
each passing day. Widespread usage of WSNs is helping mitigate many dangers. Protecting …
The performance of cover image steganography for hidden information within image file using least significant bit algorithm
E Gedkhaw, N Soodtoetong… - 2018 18th International …, 2018 - ieeexplore.ieee.org
The Protection of information with steganography is the art and science of writing hidden is a
hidden data method in various data type to conceal data and unauthorized person or …
hidden data method in various data type to conceal data and unauthorized person or …
LWE: An energy-efficient lightweight encryption algorithm for medical sensors and IoT devices
In today's world, systems generate and exchange digital data frequently and face a much
broader range of threats than in the past. Within the context of this unsafe ecosystem, it is …
broader range of threats than in the past. Within the context of this unsafe ecosystem, it is …
Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices
Nowadays, terabytes of digital data are generated and sent online every second. However,
securing this extent of information has always been a challenging task. Cryptography is a …
securing this extent of information has always been a challenging task. Cryptography is a …
Performance analysis of symmetric key cryptographic algorithms
S Vyakaranal, S Kengond - 2018 international conference on …, 2018 - ieeexplore.ieee.org
Data's security being important aspect of the today's internet is gaining more importance day
by day. With the increase in online data exchange, transactions and payments; secure …
by day. With the increase in online data exchange, transactions and payments; secure …