Messaging applications have been a common tool used by individuals as smartphones gain popularity and provide a larger range of application functions. An instant messaging program with text messaging capabilities is a...
详细信息
Results of the encryption methods analysis showed, that modern approaches only consider the cryptographic and steganographic properties of data protection algorithms and do not provide the proper level of information ...
详细信息
The paper presents an optimized SIMON lightweight cryptographic algorithm that balances security, performance, and cost in contexts with limited resources. By lowering the computational cost and preserving strong secu...
详细信息
In the era of edge computing, securing data transmission has become paramount, especially given the real-time requirements and limited computational resources of edge devices. This study introduces a novel Chaos Theor...
详细信息
This paper introduces an image encryption algorithm based on 2D-Sine-Cosine chaotic mapping and compressed sensing technology. This algorithm introduces a novel 2D-Sine-Cosine chaotic mapping function. By using nested...
详细信息
Aiming at the problem of improving image security in the process of transmission line monitoring under the condition of limited computing resources, a security encryption algorithm for transmission line monitoring ima...
详细信息
To ensure data security during the gateway's data uploading process, we introduce the advantages of chaotic mapping to AES. We then develop a multi-protocol encrypted gateway architecture based on an improved AES ...
详细信息
Modular exponentiation (ME) is a mathematical operation that is used for several public-key cryptosystems (PKCs) and other applications. It is a complex task that is an essential computational tool that enables effici...
详细信息
The traditional image encryption algorithm provides a strong security in protecting image data, and there is a situation that the encryption and decryption process consumes too much time resource computing resources, ...
详细信息
In order to solve the problem of security and efficiency of identity authentication in the process of vehicle-pile-net communication, a vehicle-pile-net identity authentication method based on improved elliptic curve ...
详细信息
暂无评论