SDA Plus: Improving the Performance of the System Determine Algorithm (SDA) of the Switching Between AES-128 and AES-256 (MOLAZ Method)
UW Abboud, ML Shuwandy - 2023 IEEE 13th International …, 2023 - ieeexplore.ieee.org
There are many encryption algorithms; some of them are strong but slow in decryption,
unlike other methods. The MOLAZ method is one of the encryption techniques in UUM's …
unlike other methods. The MOLAZ method is one of the encryption techniques in UUM's …
[PDF][PDF] Optimizing Attendance Data Security by Implementing Dynamic AES-128 Encryption
The protection of data security is crucial, particularly when dealing with the transmission of
sensitive information through communication networks. This article explores the Advanced …
sensitive information through communication networks. This article explores the Advanced …
[PDF][PDF] High-efficiency encryption and authentication network security for automotive Ethernet
JM Li, YJW Shuo-Fu, YN Xu - International Journal of Modeling and …, 2022 - ijmo.org
Automotive ethernet has the advantages of high bandwidth, low latency, and strong
compatibility, which meets the needs of new energy vehicles for the development of network …
compatibility, which meets the needs of new energy vehicles for the development of network …
[HTML][HTML] Seguridad y componentes nativos en una aplicación híbrida
D Rivero Albarrán… - Revista Científica …, 2023 - scielo.senescyt.gob.ec
El uso de dispositivos inteligentes es cada día mayor, y, por tanto, el desarrollo de
aplicaciones móviles se ha incrementado. Las empresas, conocedoras de esta realidad …
aplicaciones móviles se ha incrementado. Las empresas, conocedoras de esta realidad …
[PDF][PDF] Generation Initial Key of the AES Algorithm based on Randomized and Chaotic System
RM Al-Amri, DN Hamood, AK Farhan - Al-Salam Journal for Engineering and …, 2023 - iasj.net
Information security is a critical concern and a top priority for many communications
networks. Cryptography is a suitable method of data security that can be used to maintain …
networks. Cryptography is a suitable method of data security that can be used to maintain …
Design and Implementation of Advanced Encryption Standard by New Substitution Box in Galois Field (𝟐𝟖)
An inverse multiplexing method for irreducible polynomials is presented in this paper based
on the theory of substitution boxes. The method is based on the theory of substitution boxes …
on the theory of substitution boxes. The method is based on the theory of substitution boxes …
Implementation Cryptography and Access Control on IoT-Based Warehouse Inventory Management System
Warehousing is a product storage management activity to ensure product availability, so
inventory management is needed to oversee the movement of logistics and equipment …
inventory management is needed to oversee the movement of logistics and equipment …
Encryption and real time decryption for protecting machine learning models in android applications
A Verma - arXiv preprint arXiv:2109.02270, 2021 - arxiv.org
With the Increasing use of Machine Learning in Android applications, more research and
efforts are being put into developing better-performing machine learning algorithms with a …
efforts are being put into developing better-performing machine learning algorithms with a …
Talk to Kotaro: a web crowdsourcing study on the impact of phone and prosody choice for synthesized speech on human impression
AGC Gonzalez, WS Lo… - 2022 31st IEEE …, 2022 - ieeexplore.ieee.org
During the COVID-19 pandemic, many research areas that require in person experiments
with human volunteers have been impacted due to lockdowns and other activity-restricting …
with human volunteers have been impacted due to lockdowns and other activity-restricting …
On-the-fly key generation based VLSI implementation of advanced encryption standard
Data transmitted in a digital format is vulnerable to breaches. Here, the FPGA-based
Advanced Encryption Standard (AES) architecture is proposed to safeguard high speed …
Advanced Encryption Standard (AES) architecture is proposed to safeguard high speed …