Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Architectural optimization of parallel authenticated encryption algorithm for satellite application
SJH Pirzada, A Murtaza, T Xu, L Jianwei - IEEE Access, 2020 - ieeexplore.ieee.org
High-speed data communication is becoming essential for many applications, including
satellite communication. The security algorithms associated with the communication of …
satellite communication. The security algorithms associated with the communication of …
Model of Message Transmission across Parallel Route Groups with Dynamic Alternation of These Groups in a Multichannel Steganographic System
The subject of this study is steganographic systems that are able to hide not only the content
of the transmitted information but also the fact of its transmission. In this paper, we present a …
of the transmitted information but also the fact of its transmission. In this paper, we present a …
Using steganography techniques for implicit authentication to enhance sensitive data hiding
RN Kadhum, NHM Ali - International Journal of Nonlinear …, 2022 - ijnaa.semnan.ac.ir
Smartphones recently become indispensable to users due to the services provided, like
Internet access and important applications (eg, financial and health applications). which …
Internet access and important applications (eg, financial and health applications). which …
Lightweight encryption algorithm implementation for internet of thing application
SJH Pirzada, T Xu, L Jianwei - 2020 International Conference …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) application utilizes devices with limited hardware resources such as
the wireless sensor network application and devices with sufficient hardware resources such …
the wireless sensor network application and devices with sufficient hardware resources such …
Towards the design of a stronger AES: AES with key dependent shift rows (KDSR)
Cloud data storage is a service offered by cloud computing for storing the data. Though it
has a lot of benefits, the security of the stored data is one of its major concerns. Many models …
has a lot of benefits, the security of the stored data is one of its major concerns. Many models …
Design and implementation of a secure mobile banking system based on elliptic curve integrated encryption schema
Mobile banking relies on the Internet for transfer data between the customer's device and
bank, thereby making financial data vulnerable to theft unauthorized people. As such, a …
bank, thereby making financial data vulnerable to theft unauthorized people. As such, a …
High-throughput optimizations of AES algorithm for satellites
The increase in the flow of information and high-speed communication has compelled
researchers to use satellite networks for different applications. The satellite networks …
researchers to use satellite networks for different applications. The satellite networks …
Initialization Vector Generation for AES-CTR Algorithm to Increase Cipher-text Randomness
SJH Pirzada, A Murtaza, T Xu… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
In the present, the use of communication systems is not a luxury but a necessity. The
growing reliance on technology and its uses in all walk of life have realized the need for …
growing reliance on technology and its uses in all walk of life have realized the need for …
An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite Communication
Satellite communication is among those applications where data confidentiality is required,
but at the same time, computational resources are limited as well as the delay is critical. For …
but at the same time, computational resources are limited as well as the delay is critical. For …
Optimized Authentication Algorithm on FPGA for Space-Air-Ground Integrated Network
SJH Pirzada, T Xu, L Jianwei - 2020 14th International …, 2020 - ieeexplore.ieee.org
The increasing trend of integration of devices for extending the area of coverage for
Communication, Navigation and Surveillance (CNS) services has compelled researchers to …
Communication, Navigation and Surveillance (CNS) services has compelled researchers to …