Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure fiber-optic communication system based on Internet-accessible multipath transmission of ciphertext fragments
Y **, Y Qi, Y Chen, W Chen, W Li, N Zhu - Optics Express, 2021 - opg.optica.org
A secure fiber-optic communication system based on Internet-accessible multipath
transmission of ciphertext fragment (MTCF) technology is proposed and demonstrated in this …
transmission of ciphertext fragment (MTCF) technology is proposed and demonstrated in this …
Personal identifiable information privacy model for securing of users' attributes transmitted to a federated cloud environment
One of the security issues affecting Federated Cloud Environment users is privacy. It is the
ability to secure and control the Personal Identifiable Information (PII) of a user during and …
ability to secure and control the Personal Identifiable Information (PII) of a user during and …
Performance analysis of cryptographic algorithms for cloud security
GS Vennela, NV Varun, N Neelima… - 2018 Second …, 2018 - ieeexplore.ieee.org
Cloud generally relates to storing, processing and managing of data over a network. The
cloud provides mainly three services, storage as a service, platform as a service and …
cloud provides mainly three services, storage as a service, platform as a service and …
Piecewise symmetric magic cube: application to text cryptography
This article propounds a Piecewise Symmetric Magic Cube (PSMC), the properties of which
have reinvigorated its application to text encryption. A method has been introduced for the …
have reinvigorated its application to text encryption. A method has been introduced for the …
Application of Genetics Algorithms in Cryptography
P Pekarčík, E Chovancová… - 2024 IEEE 28th …, 2024 - ieeexplore.ieee.org
One of the most essential subfields of modern IT is undoubtedly cybersecurity. The
cybersecurity practice, also known as cryptology, combines various disciplines like computer …
cybersecurity practice, also known as cryptology, combines various disciplines like computer …
Evaluation of Various Cryptographic Techniques Based on File Size on Cloud Storage Security
K Mahalakshmi, K Kuppusamy - International Conference on Computing …, 2022 - Springer
Cloud storage and Internet applications are growing rapidly in the recent years. These
applications are used by millions of users and controlled by authorized administrators. With …
applications are used by millions of users and controlled by authorized administrators. With …
[PDF][PDF] Securing Game Code using AES and Logistic Map
SE Harfoush - 2023 - researchgate.net
The thesis paper presents a comprehensive investigation into securing game code by
utilizing the advanced encryption standard (AES) and logistic map. The primary aim of this …
utilizing the advanced encryption standard (AES) and logistic map. The primary aim of this …
[PDF][PDF] A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem.
J **ao, A Neupane, HF Fayoumi, W Sun - ICISSP, 2022 - pdfs.semanticscholar.org
Our current key exchange protocols are at risk of failing to keep private data secret due to
advancements in technology. Therefore, there is a need to develop an efficient and secure …
advancements in technology. Therefore, there is a need to develop an efficient and secure …
[PDF][PDF] Towards Objective Comparison of Security Algorithms for Resource-Constrained IoT Devices
M Fischer, R Tönjes - 2024 - opus.hs-osnabrueck.de
Networked sensors are strategically deployed to gather real-world data, thereby facilitating
the implementation of cutting-edge technologies like the Internet of Things (IoT) and Cyber …
the implementation of cutting-edge technologies like the Internet of Things (IoT) and Cyber …
[PDF][PDF] Performance Analysis of Blowfish, IDEA and AES Encryption Algorithms
MM Abay - International Journal, 2019 - academia.edu
Network and internet applications are growing rapidly in the recent past. These applications
are used by thousand of users and controlled by different administrative entities. It is mainly …
are used by thousand of users and controlled by different administrative entities. It is mainly …