[HTML][HTML] Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security
Secure data transmission in wireless mesh networks is a necessary attribute for machine
learning-based intrusion detection systems (IDS). Numerous attacks may have an adverse …
learning-based intrusion detection systems (IDS). Numerous attacks may have an adverse …
[HTML][HTML] An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)
FO Mojisola, S Misra, CF Febisola… - Egyptian Informatics …, 2022 - Elsevier
The recent innovations in network application and the internet have made data and network
security the major role in data communication system development. Cryptography is one of …
security the major role in data communication system development. Cryptography is one of …
A true random number generator based on double threshold-switching memristors for image encryption
J Bian, Y Tao, Z Wang, Y Dong, Z Li, X Zhao… - Applied Physics …, 2023 - pubs.aip.org
True random number generator (TRNG) that cannot be arbitrary attacked with predictable
software algorithm is a promising data security solution. Memristors, possessing specific …
software algorithm is a promising data security solution. Memristors, possessing specific …
Secured cloud SCADA system implementation for industrial applications
FA Osman, MYM Hashem, MAR Eltokhy - Multimedia Tools and …, 2022 - Springer
Abstract The proposed Remote SCADA System (RSS) is a smarter, faster and more reliable
way to control high power machines and monitor their sensors, data, and failures. The …
way to control high power machines and monitor their sensors, data, and failures. The …
Design, analysis, and implementation of a new lightweight block cipher for protecting IoT smart devices
AAM Ragab, A Madani, AM Wahdan… - Journal of Ambient …, 2023 - Springer
Abstract A modified XXTEA “M-XXTEA” symmetric block cipher that has a simple
construction compared to the advanced encryption standard (AES) is proposed. It is efficient …
construction compared to the advanced encryption standard (AES) is proposed. It is efficient …
[PDF][PDF] Secure key exchange against man-in-the-middle attack: Modified diffie-hellman protocol
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a
widely used technique on which key exchange systems around the world depend. This …
widely used technique on which key exchange systems around the world depend. This …
Security enhancement of AES-CBC and its performance evaluation using the avalanche effect
HT Assafli, IA Hashim - 2020 3rd International Conference on …, 2020 - ieeexplore.ieee.org
The security of communication systems is becoming a significant concern with the increase
in computational power. High-security cryptographic algorithms are required to protect the …
in computational power. High-security cryptographic algorithms are required to protect the …
Secure framework for IoT technology based on RSA and DNA cryptography
MM Elamir, MS Mabrouk, SY marzouk - Egyptian Journal of Medical …, 2022 - Springer
Abstract Background The Internet of things (IoT) is the network of different objects or “things”
containing sensors, software, and other technologies used to exchange data between …
containing sensors, software, and other technologies used to exchange data between …
Novel image pixel scrambling technique for efficient color image encryption in resource-constrained IoT devices
In the digital age, where data is a valuable commodity, securing sensitive information has
become a growing concern. Image encryption techniques play an essential role in protecting …
become a growing concern. Image encryption techniques play an essential role in protecting …
Power system real time data encryption system based on DES algorithm
A Cui, H Zhao, X Zhang, B Zhao… - 2021 13th International …, 2021 - ieeexplore.ieee.org
To ensure the safe operation of power system, this paper studies two technologies of data
encryption and digital signature, and designs a real-time data encryption system based on …
encryption and digital signature, and designs a real-time data encryption system based on …