IoT-based multi-sensor healthcare architectures and a lightweight-based privacy scheme
V Aivaliotis, K Tsantikidou, N Sklavos - Sensors, 2022 - mdpi.com
Health 4.0 is a new promising addition to the healthcare industry that innovatively includes
the Internet of Things (IoT) and its heterogeneous devices and sensors. The result is the …
the Internet of Things (IoT) and its heterogeneous devices and sensors. The result is the …
Digital image scrambling based on a new one-dimensional coupled Sine map
B Yosefnezhad Irani, P Ayubi, F Amani Jabalkandi… - Nonlinear …, 2019 - Springer
This paper proposes a new one-dimensional chaotic map, called chaotic coupled Sine map
(CCSM), for the scrambling and encryption processes. The purpose of the CCSM design is …
(CCSM), for the scrambling and encryption processes. The purpose of the CCSM design is …
Dynamic Hash key‐based stream cipher for secure transmission of real time ECG signal
KKS Pandian, KC Ray - Security and Communication Networks, 2016 - Wiley Online Library
In the last few decades, patients demand the data integrity and confidentiality of their
Electrocardiography (ECG) signal for remote diagnosis through the network. In this context …
Electrocardiography (ECG) signal for remote diagnosis through the network. In this context …
[PDF][PDF] Cryptography using random Rc4 stream cipher on SMS for android-based smartphones
R Rifki, A Septiarini, HR Hatta - IJACSA) International Journal of …, 2018 - academia.edu
Service (SMS) application have to pass the SMS Center (SMSC) to record the
communication between the sender and recipient. Therefore, the message security is not …
communication between the sender and recipient. Therefore, the message security is not …
Implementation of RC4 cryptography algorithm for data file security
AF Doni, OAH Maria, S Hanif - Journal of Physics: Conference …, 2020 - iopscience.iop.org
Communication in the digital age plays an important role, a person can carry out various
transactions or exchange data practically and quickly. So as to pose a great risk to …
transactions or exchange data practically and quickly. So as to pose a great risk to …
Analysis of the formation of a dynamic brief key algorithm RC4+ for file security
S Karo-Karo, M Zarlis - IOP Conference Series: Materials …, 2020 - iopscience.iop.org
The development of technology, makes it easy for us to communicate and exchange
information and can also have an impact on the development of cryptographic algorithms …
information and can also have an impact on the development of cryptographic algorithms …
Optimizing Security in OBS: Implementation and Evaluation of Modified SHA-160 Algorithm
AM Balamurugan, GD Vignesh… - 2024 First International …, 2024 - ieeexplore.ieee.org
OBS is a technology with the potential to meet the increasing network demands. However,
due to its dynamic nature, ensuring security is still a challenge. The objective of the …
due to its dynamic nature, ensuring security is still a challenge. The objective of the …
FPGA implementation of hash key based stream cipher using nfsr and its security aspects
KKS Pandian, KC Ray - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
In the last few decades, hardware-based embedded system incorporated with millions of
logic gates; memory of megabytes size; high-speed processor and transceivers used for …
logic gates; memory of megabytes size; high-speed processor and transceivers used for …
Developed RC4 Algorithm with Double Reverse for Better Data Protect
FSM Alkhazraji - Al-Esraa University College Journal for …, 2022 - jes.esraa.edu.iq
Computer security plays a crucial role in protecting users' data, and cryptographic
techniques are commonly used for this purpose. Encryption is a method employed to ensure …
techniques are commonly used for this purpose. Encryption is a method employed to ensure …
[PDF][PDF] Reconfigurable Design of Low Power Hybrid Crypto Processor using Signcryption for Wireless Networks
C Lakshmi, PJ Jayarin - International Journal, 2020 - academia.edu
Now a day all the communications are carried out in wireless medium. It is necessary to
transmit the confidential data in wireless media in secure manner. Cryptography is …
transmit the confidential data in wireless media in secure manner. Cryptography is …