A kernel machine-based secure data sensing and fusion scheme in wireless sensor networks for the cyber-physical systems

X Luo, D Zhang, LT Yang, J Liu, X Chang… - Future Generation …, 2016 - Elsevier
Wireless sensor networks (WSNs) as one of the key technologies for delivering sensor-
related data drive the progress of cyber-physical systems (CPSs) in bridging the gap …

High-uncertainty audio signal encryption based on the Collatz conjecture

D Renza, S Mendoza - Journal of Information Security and Applications, 2019 - Elsevier
Transmission of protected content via commercial channels is a common problem observed
in information security. The secrecy of such content can be preserved using various …

Symmetric key algorithm in computer security: a review

R Anusha, MJD Kumar, VS Shetty… - 2020 4th International …, 2020 - ieeexplore.ieee.org
The primary objective of any computer security algorithm is that the untrusted third party
should not be able to read or gain knowledge about the data being communicated or stored …

[PDF][PDF] Securing one time password (OTP) for multi-factor out-of-band authentication through a 128-bit blowfish algorithm

ARL Reyes, ED Festijo, RP Medina - International Journal of …, 2018 - researchgate.net
Authentication and cryptography have been used to address security issues on various
online services. However, studies have shown that even the most commonly-used multi …

[PDF][PDF] Modified blowfish algorithm

TFG Quilala, AM Sison, RP Medina - Indonesian Journal of …, 2018 - researchgate.net
Cryptography guarantees security in communication through encryption. This paper
proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to …

Design and implementation of blowfish algorithm using reconfigurable platform

SB Nalawade, DH Gawali - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Security is an important issue during communication and data transmission. There are many
ways to provide security. One method to ensure security is the use of cryptographic …

Covert communication model for speech signals based on an indirect and adaptive encryption technique

HI Shahadi - Computers & Electrical Engineering, 2018 - Elsevier
This study proposes an indirect speech encryption technique that applies the chameleon
style. A chameleon adapts its skin colour according to its surrounding environment to protect …

An expert-based approach for demand curtailment allocation subject to communications and cyber security limitations

D Bian - 2017 - vtechworks.lib.vt.edu
A smart grid is different from a traditional power system in that it allows incorporation of
intelligent features and functions, eg, meter reading, adaptive demand response, integration …

Security and efficiency of Feistel networks versus discrete chaos for lightweight speech encryption

WS Sayed, MF Tolba, AG Radwan… - 2018 30Th …, 2018 - ieeexplore.ieee.org
This paper compares examples of non-chaotic and chaotic ciphers from the viewpoint of
their suitability for speech encryption, especially in real-time and lightweight cipher systems …

[PDF][PDF] An Enhanced Blowfsh Algorithm with Reduced Computational Speed

GM Damola, R Jimoh, O Abikoye - 2022 - sciresliterature.org
Cryptography guarantees security in communication through encryption. By superimposing
shares in pairs, it is possible to identify any instances of fraud. The hidden picture is …