Experimental validation of IoT image encryption scheme based on a 5-D fractional hyperchaotic system and Numba JIT compiler
D Clemente-López, JM Munoz-Pacheco… - Internet of Things, 2024 - Elsevier
In the realm of Internet of Things (IoT) systems, the interconnectivity of physical hardware
devices is a fundamental aspect, and as a result, data exchange assumes a critical role in …
devices is a fundamental aspect, and as a result, data exchange assumes a critical role in …
Shrinkable Cryptographic Technique Using Involutory Function for Image Encryption
Cryptography is the technique of hiding and transmitting confidential information via the
internet. There are various traditional cryptographic approaches have been presented by …
internet. There are various traditional cryptographic approaches have been presented by …
The Detection of SQL Injection on Blockchain-Based Database
In today's world, the storage of data needs a huge amount of space. Meanwhile, cloud and
distributed environments provide sufficient storage space for the data. One of the …
distributed environments provide sufficient storage space for the data. One of the …
Voice-Based Speaker Identification and Verification
In recent years, the advancement in voice-based authentication leads in the field of
numerous forensic voice authentication technology. For verification, the speech reference …
numerous forensic voice authentication technology. For verification, the speech reference …
[PDF][PDF] An Efficient Diffusion Approach for Chaos-Based Image Encryption and DNA Sequences
GK Shraida, HA Younis - Iraqi Journal for Electrical and Electronic …, 2022 - iasj.net
Experts and researchers in the field of information security have placed a high value on the
security of image data in the last few years. They have presented several image encryption …
security of image data in the last few years. They have presented several image encryption …
A Study on Supervised Machine Learning Technique to Detect Anomalies in Networks
K Sinha - Handbook of Research on Library Response to the …, 2021 - igi-global.com
During this time, COVID-19 has affected the lifestyles of many individuals; in the meantime,
an enormous amount of users are connected with the internet. This will also increase the …
an enormous amount of users are connected with the internet. This will also increase the …
An Efficient Approach for Sending Identification Bit With the Help of Blowfish-RC6
K Patidar, DP Tiwari, P Sharma… - … of Research on …, 2023 - igi-global.com
This chapter used an efficient mechanism based on blowfish and the RC6 (BRC6) algorithm
for better security against cross-site scripting (XSS) attacks. The data types covered in this …
for better security against cross-site scripting (XSS) attacks. The data types covered in this …
Novel Library Innovations and Advancements After the COVID-19 Pandemic Era
This chapter investigates and reviews novel library innovations and advancements after the
COVID-19 pandemic era. It draws attention to several ways that the pandemic is forcing …
COVID-19 pandemic era. It draws attention to several ways that the pandemic is forcing …