With the rapid popularization of intelligent vehicles, the security of vehicle terminal firmware in the process of remote upgrade is becoming more and more important. To this end, two improvement measures are proposed...
详细信息
The paper presents an optimized SIMON lightweight cryptographic algorithm that balances security, performance, and cost in contexts with limited resources. By lowering the computational cost and preserving strong secu...
详细信息
In the era of edge computing, securing data transmission has become paramount, especially given the real-time requirements and limited computational resources of edge devices. This study introduces a novel Chaos Theor...
详细信息
Aiming at the problem of improving image security in the process of transmission line monitoring under the condition of limited computing resources, a security encryption algorithm for transmission line monitoring ima...
详细信息
To ensure data security during the gateway's data uploading process, we introduce the advantages of chaotic mapping to AES. We then develop a multi-protocol encrypted gateway architecture based on an improved AES ...
详细信息
This paper introduces an image encryption algorithm based on 2D-Sine-Cosine chaotic mapping and compressed sensing technology. This algorithm introduces a novel 2D-Sine-Cosine chaotic mapping function. By using nested...
详细信息
Modular exponentiation (ME) is a mathematical operation that is used for several public-key cryptosystems (PKCs) and other applications. It is a complex task that is an essential computational tool that enables effici...
详细信息
In order to solve the problem of security and efficiency of identity authentication in the process of vehicle-pile-net communication, a vehicle-pile-net identity authentication method based on improved elliptic curve ...
详细信息
The traditional image encryption algorithm provides a strong security in protecting image data, and there is a situation that the encryption and decryption process consumes too much time resource computing resources, ...
详细信息
Tripe Advanced encryption Standard was utilized for the purpose of enhancing retrieval rate analysis in privacy data sharing secured cloud computing. This was contrasted to Blowfish. Many people believe that security ...
详细信息
暂无评论