Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …
An incentive and reputation mechanism based on blockchain for crowd sensing network
Nowadays, sensors inserted in mobile applications are used for gathering data for an
explicit assignment that can effectively save cost and time in crowd sensing networks …
explicit assignment that can effectively save cost and time in crowd sensing networks …
Novel implementation of audio encryption using pseudorandom byte generator
In this paper, we present an algorithm for encrypting audio files based on the Ikeda map, a
mathematical function of chaos theory. Detailed experimental, security and theoretical …
mathematical function of chaos theory. Detailed experimental, security and theoretical …
Start code-based encryption and decryption framework for hevc
MK Lee, ES Jang - IEEE Access, 2020 - ieeexplore.ieee.org
In this article, we propose a new selective encryption and decryption framework based on
the start code for high efficiency video coding. There is a growing need to encrypt video …
the start code for high efficiency video coding. There is a growing need to encrypt video …
[PDF][PDF] Analyzing and securing data using data science and blockchain in smart networks
I Zainib Noshad (Registration No. CIIT/FA17-RSE-038/ISB) hereby declare that I have
produced the work presented in this thesis during the scheduled period of study. I also …
produced the work presented in this thesis during the scheduled period of study. I also …
Image steganography using steg with AES and LSB
L Negi, L Negi - 2021 IEEE 7th international conference on …, 2021 - ieeexplore.ieee.org
Nowadays mobile phone becoming one of the most popular communication system.
Information shared through this medium is a very sensitive to the users. Hence it is highly …
Information shared through this medium is a very sensitive to the users. Hence it is highly …
Performance investigations on data protection algorithms in generalized multi protocol label switched optical networks
Monika, S Singh, A Wason - Scientific Reports, 2023 - nature.com
In future generation networks, data protection is a crucial necessity particularly when
information is sent on a system. Network protection has three objectives known as …
information is sent on a system. Network protection has three objectives known as …
A blockchain based incentive mechanism for crowd sensing network
Abstract Crowd Sensing Network (CSN) uses sensor embedded mobile phones for the
collection of data for some specific task which can effectively save cost and time. The quality …
collection of data for some specific task which can effectively save cost and time. The quality …
An innovative model for the enhancement of IoT device using lightweight cryptography
The problem statement is that at present there is no stable algorithm which provides security
for resource constrained devices because classic cryptography algorithms are too heavy to …
for resource constrained devices because classic cryptography algorithms are too heavy to …
Performance analysis of AES, Blowfish and Rijndael: cryptographic algorithms for audio
Normally people share data like text, image, audio or video with others using a computer
network. When these media are transmitting through the computer network, it faces various …
network. When these media are transmitting through the computer network, it faces various …