Our work presents a novel approach to creating new encryption algorithms. We were inspired by genetic algorithms based on the Darwin evolution theory. As the method of invention, we chose the crossover technique. We a...
详细信息
The susceptibility of digital image communication is a crucial issue in the domain of digital transfer. The image encryption literature has presented numerous cryptosystems to enhance communication security. Image enc...
详细信息
The use of encryption algorithms is more and more turning into a crucial issue of defensive wireless networks. encryption algorithms may be used to cozy facts that is transferred over a Wi-Fi network while also presen...
详细信息
With the rise of IoT technology, the usage of IoT devices and systems is steadily increasing. However, concerns over excessive overhead and data security in IoT perceptual layer communication are becoming increasingly...
详细信息
This paper briefly introduces wireless sensor networks (WSNs) and proposes an enhancement to a block encryption algorithm using chaotic mapping principles. The proposed encryption algorithm was tested on an establishe...
详细信息
With the bursting and fast development of computer science and CD-ROM technology, the storage optimization and related encryption algorithms are studied popularly. Due to the emergence of heterogeneous cloud storage s...
详细信息
ISBN:
(纸本)9781315685892;9781138028005
With the bursting and fast development of computer science and CD-ROM technology, the storage optimization and related encryption algorithms are studied popularly. Due to the emergence of heterogeneous cloud storage systems, we generalize the concept of the FR code and propose the IFR code. A key property of the FR code is its un-coded repair process. To determine the repair pattern, which we call the repair overlay, and the storage allocation, we formulate the whole problem based on a new irregular model, with the aim of minimizing the system repair cost by properly designing the MDS-IFR code and the retrieval sets. The simulation result prove the effectiveness of our method.
This article and its outputs reveal the need of search for the most suitable encryption algorithm used in PLC devices, the procedure for simulating performance of encryption algorithm and practical measurement of thro...
详细信息
ISBN:
(纸本)9781467311182
This article and its outputs reveal the need of search for the most suitable encryption algorithm used in PLC devices, the procedure for simulating performance of encryption algorithm and practical measurement of throughput in the PLC networks.
Data storage devices such as disk drives and personal storage devices (PSD) such as flash disks are now widely used in everyday appliances. Data breaches have grown rapidly in the recent years due to compromised confi...
详细信息
ISBN:
(纸本)9780769536545
Data storage devices such as disk drives and personal storage devices (PSD) such as flash disks are now widely used in everyday appliances. Data breaches have grown rapidly in the recent years due to compromised confidential data from storage devices. These trends forced standardization of encryption methods to secure storage devices. This paper provides a comparison review of existing encryption algorithms and modes of operations that are suitable for securing storage devices, mainly disk drives. The recent IEEE approved standard for encryption mode of operation, XTS will be evaluated in term of performance with different algorithms (AES, Twofish, and RC6). The performance of XTS mode with other modes of operations (LRW and CBC) will be explored. This detailed review and performance analysis will provide guidelines for storage devices designers to implement disk encryption.
Wireless sensor networks are vulnerable to attacks that can compromise the data transmitted through them. To ensure security and confidentiality, encryption algorithms are necessary. To evaluate the effectiveness of e...
详细信息
The Internet of Things (IoT) consists of a network of resource-constrained devices, sensors, and machines that are interconnected and communicate via the internet. However, these devices often struggle while handling ...
详细信息
暂无评论