[HTML][HTML] Cryptographic data security for reliable wireless sensor network
Abstract Wireless Sensor Networks (WSNs) are widely utilized in a variety of applications.
Attackers might interfere with equipment, and eavesdrop on conversations. Attackers can …
Attackers might interfere with equipment, and eavesdrop on conversations. Attackers can …
[PDF][PDF] A review on DES, AES and blowfish for image encryption & decryption
A Devi, A Sharma, A Rangra - International Journal of Computer Science …, 2015 - Citeseer
Network Security is the most vital component in information security because it is
responsible for securing all information passed through networked computers.[1] In this …
responsible for securing all information passed through networked computers.[1] In this …
A secure steganography creation algorithm for multiple file formats
R Vinothkanna - Journal of Innovative Image Processing, 2019 - irojournals.com
The technological advancements in the information sharing and the development of many
techniques to make the information conveyance easy necessitate a protection methodology …
techniques to make the information conveyance easy necessitate a protection methodology …
[HTML][HTML] Two-phase hybrid cryptography algorithm for wireless sensor networks
For achieving security in wireless sensor networks (WSNs), cryptography plays an important
role. In this paper, a new security algorithm using combination of both symmetric and …
role. In this paper, a new security algorithm using combination of both symmetric and …
[PDF][PDF] Improving the security of cloud computing by building new hybrid cryptography algorithms
DS AbdElminaam - International Journal of Electronics and …, 2018 - ijeie.jalaxy.com.tw
Cryptography considered from the old science that are human learn it and motivated it
through all past years, Cryptography consist of two main items encryption and decryption …
through all past years, Cryptography consist of two main items encryption and decryption …
A novel approach to the design of a new hybrid security protocol architecture
This research paper is simply the gathering of recent developments in the field of Hybrid
cryptography and its application in the designing of a hybrid security protocol for online …
cryptography and its application in the designing of a hybrid security protocol for online …
A proposed scheme to achieve node authentication in military applications of wireless sensor network
D Suhag, SS Gaur, AK Mohapatra - Journal of Statistics and …, 2019 - Taylor & Francis
Abstract Wireless Sensor Network is one of the most rapidly evolving networks which are
being deployed in a wide variety of applications like agriculture, environment monitoring …
being deployed in a wide variety of applications like agriculture, environment monitoring …
A new security protocol using hybrid cryptography algorithms
A group of sensor nodes deployed in particular environment constitutes a wireless sensor
network (WSN). At times the WSN can be even deployed in a very sensitive area where the …
network (WSN). At times the WSN can be even deployed in a very sensitive area where the …
Hybrid encryption algorithm in wireless body area networks (WBAN)
The wireless body area network is part of wireless sensor network in which both indoor and
outdoor patients are monitored using sensors and wireless technology. The critical phase of …
outdoor patients are monitored using sensors and wireless technology. The critical phase of …
Hybrid cryptography algorithm for secure and low cost communication
SK Ghosh, S Rana, A Pansari, J Hazra… - … on Computer Science …, 2020 - ieeexplore.ieee.org
In a client-server architecture or open networks such as the internet, transmission of data
may lead to leak of confidential information. The objective of encryption is to secure or …
may lead to leak of confidential information. The objective of encryption is to secure or …