Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] Cryptanalysis of polyalphabetic cipher using differential evolution algorithm
Cryptanalysis of Polyalphabetic Cipher Using Differential Evolution Algorithm Page 1 Tehnički
vjesnik 27, 4(2020), 1101-1107 1101 ISSN 1330-3651 (Print), ISSN 1848-6339 (Online) …
vjesnik 27, 4(2020), 1101-1107 1101 ISSN 1330-3651 (Print), ISSN 1848-6339 (Online) …
Securing medical IoT devices using Diffie-Hellman and DES cryptographic schemes
IoT cuts across almost any field where communication or monitoring is needed. Recent
works in IoT focuse on the architecture, secured communication, topologies, platforms etc. In …
works in IoT focuse on the architecture, secured communication, topologies, platforms etc. In …
A robust indoor localization method for NLOS environments utilizing sensor subsets
K Ishida, E Okamoto, HB Li - IEEE Open Journal of Signal …, 2022 - ieeexplore.ieee.org
Indoor location localization using the time of arrival (TOA) of ultra-wideband (UWB) radio
waves faces a challenge in obtaining accurate TOA values in a non-line-of-sight (NLOS) …
waves faces a challenge in obtaining accurate TOA values in a non-line-of-sight (NLOS) …
A Survey of Lightweight Cryptosystems for Smart Home Devices
A Smart Home uses interconnected network technology to monitor the environment, control
the various physical appliances, and communicate with each other in a close environment. A …
the various physical appliances, and communicate with each other in a close environment. A …
Enkripsi dan dekripsi pesan menggunakan polinomial Galois Field dengan algoritma Hill Cipher
A Vega - 2022 - etheses.uin-malang.ac.id
Dalam proses penyusunan skripsi ini, penulis banyak menerima bimbingan, masukan, dan
arahan dari berbagai pihak. Oleh karena itu melalui halaman ini penulis ingin …
arahan dari berbagai pihak. Oleh karena itu melalui halaman ini penulis ingin …
New Post-quantum Crypto-algorithm Utilizing Hash Function: Applicable in Blockchain
N Tiwari, S Dwivedi, S Singh - International Conference On Innovative …, 2024 - Springer
Hash-based cryptosystem is most active research area in cryptography. Hash-based
cryptosystem provides more security and authenticity because hash functions are …
cryptosystem provides more security and authenticity because hash functions are …
[PDF][PDF] GPH
MNJO Ozioma - International Journal of Mathematics, 2023 - researchgate.net
ABSTRACT RSA encryption is a widely employed cryptographic is the branch of pure
mathematics that studies posit theory seeks to discover relationships existing be decryption …
mathematics that studies posit theory seeks to discover relationships existing be decryption …
Performance Limits of QR Code Technology for Air-Gapped Military Communication
A Thoresson - 2024 - diva-portal.org
In this thesis, an investigation into the feasibility and performance limits of QR code
technology to enable secure air-gapped military communication was performed. Conducted …
technology to enable secure air-gapped military communication was performed. Conducted …
[PDF][PDF] A Comparative Survey of Symmetric and Asymmetric Key Cryptography Algorithms
UH Shaikh, MM Abbas, SA Lahad, M Razi, M Shaikh - researchgate.net
In today's digital world it is crucial to ensure that sensitive information is securely transmitted
and stored. Cryptography, which involves encoding and decoding data plays a role, in …
and stored. Cryptography, which involves encoding and decoding data plays a role, in …
Security Strategies and Blockchain Functionalities for Genomics Analytics in Bioinformatics
A Mohammed Yakubu - 2021 - opal.latrobe.edu.au
A thesis submitted in total fulfilment of the requirements for the degree of Doctor of
Philosophy to the Department of Computer Science and Information Technology, School of …
Philosophy to the Department of Computer Science and Information Technology, School of …