Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine learning cryptography methods for IoT in healthcare
Background The increased application of Internet of Things (IoT) in healthcare, has fueled
concerns regarding the security and privacy of patient data. Lightweight Cryptography …
concerns regarding the security and privacy of patient data. Lightweight Cryptography …
Symmetric cryptography using multiple access circular queues (MACQ)
S Phull, S Som - Proceedings of the Second International Conference …, 2016 - dl.acm.org
In order to provide secure data communication in present cyber space world, a stronger
encryption technique becomes a necessity that can help people to protect their sensitive …
encryption technique becomes a necessity that can help people to protect their sensitive …
Symkrypt: A general-purpose and lightweight symmetric-key cryptography
R Patgiri - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Symmetric-key cryptography is used widely due to its capability to provide a strong defense
against diverse attacks; however, it is prone to cryptanalysis attacks. Therefore, we propose …
against diverse attacks; however, it is prone to cryptanalysis attacks. Therefore, we propose …
[PDF][PDF] Performance Evaluation of Lightweight Cryptographic Algorithms for IoT in Healthcare
T Chinbat - 2022 - openrepository.aut.ac.nz
The significant number of objects interconnected to the Internet has grown as the Internet
has become a more critical aspect of today's society. Network access, such as the Internet, is …
has become a more critical aspect of today's society. Network access, such as the Internet, is …
symKrypt: A Lightweight Symmetric-Key Cryptography for Diverse Applications
R Patgiri - International Conference on Computer and Information …, 2022 - Springer
Symmetric-key cryptography is used widely due to its capability to provide a strong defense
against diverse attacks; however, it is prone to cryptanalysis attacks. Therefore, we propose …
against diverse attacks; however, it is prone to cryptanalysis attacks. Therefore, we propose …
[PDF][PDF] A comparison of lightweight Ciphers Meeting NIST lightweight cryptography requirements to the advanced encryption standard
J Figueroa-Hernandez Jr - 2019 - scholarworks.calstate.edu
As the Internet has become a major part of a person's daily life, the type of devices
connected to the Internet has expanded. Network access, including the Internet, is no longer …
connected to the Internet has expanded. Network access, including the Internet, is no longer …
[PDF][PDF] Muli-operation Data Encryption Mechanism Using Dynamic Data Blocking and Randomized Substitution
IA Shoukat - 2016 - core.ac.uk
Existing cryptosystems deal with static design features such as fixed sized data blocks, static
substitution and apply identical set of known encryption operations in each encryption …
substitution and apply identical set of known encryption operations in each encryption …