A kernel machine-based secure data sensing and fusion scheme in wireless sensor networks for the cyber-physical systems
Wireless sensor networks (WSNs) as one of the key technologies for delivering sensor-
related data drive the progress of cyber-physical systems (CPSs) in bridging the gap …
related data drive the progress of cyber-physical systems (CPSs) in bridging the gap …
High-uncertainty audio signal encryption based on the Collatz conjecture
Transmission of protected content via commercial channels is a common problem observed
in information security. The secrecy of such content can be preserved using various …
in information security. The secrecy of such content can be preserved using various …
Symmetric key algorithm in computer security: a review
The primary objective of any computer security algorithm is that the untrusted third party
should not be able to read or gain knowledge about the data being communicated or stored …
should not be able to read or gain knowledge about the data being communicated or stored …
[PDF][PDF] Securing one time password (OTP) for multi-factor out-of-band authentication through a 128-bit blowfish algorithm
Authentication and cryptography have been used to address security issues on various
online services. However, studies have shown that even the most commonly-used multi …
online services. However, studies have shown that even the most commonly-used multi …
[PDF][PDF] Modified blowfish algorithm
TFG Quilala, AM Sison, RP Medina - Indonesian Journal of …, 2018 - researchgate.net
Cryptography guarantees security in communication through encryption. This paper
proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to …
proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to …
Design and implementation of blowfish algorithm using reconfigurable platform
SB Nalawade, DH Gawali - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Security is an important issue during communication and data transmission. There are many
ways to provide security. One method to ensure security is the use of cryptographic …
ways to provide security. One method to ensure security is the use of cryptographic …
Covert communication model for speech signals based on an indirect and adaptive encryption technique
HI Shahadi - Computers & Electrical Engineering, 2018 - Elsevier
This study proposes an indirect speech encryption technique that applies the chameleon
style. A chameleon adapts its skin colour according to its surrounding environment to protect …
style. A chameleon adapts its skin colour according to its surrounding environment to protect …
An expert-based approach for demand curtailment allocation subject to communications and cyber security limitations
D Bian - 2017 - vtechworks.lib.vt.edu
A smart grid is different from a traditional power system in that it allows incorporation of
intelligent features and functions, eg, meter reading, adaptive demand response, integration …
intelligent features and functions, eg, meter reading, adaptive demand response, integration …
Security and efficiency of Feistel networks versus discrete chaos for lightweight speech encryption
This paper compares examples of non-chaotic and chaotic ciphers from the viewpoint of
their suitability for speech encryption, especially in real-time and lightweight cipher systems …
their suitability for speech encryption, especially in real-time and lightweight cipher systems …
[PDF][PDF] An Enhanced Blowfsh Algorithm with Reduced Computational Speed
Cryptography guarantees security in communication through encryption. By superimposing
shares in pairs, it is possible to identify any instances of fraud. The hidden picture is …
shares in pairs, it is possible to identify any instances of fraud. The hidden picture is …