Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A multithreaded programming approach for multimedia big data: encryption system
S Aljawarneh, MB Yassein, WA Talafha - Multimedia Tools and …, 2018 - Springer
Multimedia is currently seen to dominate the internet network and the mobile network traffic;
hence, it is seen as the largest Big data. Generally, the symmetric encryption algorithms are …
hence, it is seen as the largest Big data. Generally, the symmetric encryption algorithms are …
Light weight cryptographic algorithms for medical internet of things (IoT)-a review
DJ Rani, SE Roslin - 2016 Online international conference on …, 2016 - ieeexplore.ieee.org
Internet of things (IoT) is communication between smart objects and human. It finds
enormous applications in the field of healthcare monitoring, information management …
enormous applications in the field of healthcare monitoring, information management …
A complexity-reduced block encryption algorithm suitable for internet of things
X Guo, J Hua, Y Zhang, D Wang - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) poses stringent requirements on service quality and security
strength. A highly reliable encryption algorithm with low complexity is required to ensure …
strength. A highly reliable encryption algorithm with low complexity is required to ensure …
High-level implementation of a chaotic and AES based crypto-system
Given the increasing complexity of cryptographic devices, testing their security level against
existing attacks requires a fast simulation environment. SystemC is a standard language that …
existing attacks requires a fast simulation environment. SystemC is a standard language that …
Towards genetic cryptography for biomedical wireless sensor networks gateways
Z Hamici - IEEE Journal of Biomedical and Health Informatics, 2018 - ieeexplore.ieee.org
The integration of wireless sensor networks into Internet of things, led to a new generation of
sensor nodes, directly connected to remote servers, for signal processing and decision …
sensor nodes, directly connected to remote servers, for signal processing and decision …
Security enhancement of blowfish block cipher
Cryptography is the first line of defense to protect the data from intruder. Symmetric
cryptography and asymmetric cryptography are two cryptographic based algorithms that …
cryptography and asymmetric cryptography are two cryptographic based algorithms that …
Performance Comparison of Software-Efficient Implementations of the PRESENT Block Cypher
PRESENT is one of the first standard hardware efficient, ultra-lightweight block cyphers
designed to secure highly resource-constrained devices. The 4x4 s-boxes and 64-bit …
designed to secure highly resource-constrained devices. The 4x4 s-boxes and 64-bit …
A Study of AES Software Implementation for IoT Systems
A Tripathy, B Singh - … Conference on Issues and Challenges in …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is a network of physical objects. This concept enables data
exchange between connected things without human intervention. However, the devices …
exchange between connected things without human intervention. However, the devices …
Secrecy performance analysis of hybrid AF-DF relaying under multi hop environment
In this work, a three-hop wireless relaying model comprising of a single source and
destination node, along with two relay nodes and an eavesdropper is considered. We made …
destination node, along with two relay nodes and an eavesdropper is considered. We made …
[PDF][PDF] Block symmetric cipher with random s-boxes
K Lisickiy, V Dolgov, I Lisickaya… - International Journal …, 2019 - pdfs.semanticscholar.org
This paper describes a new 256-bit block symmetric substitutionpermutation cipher, called
managed substitution cipher. This is a cipher with single-layer permutated transformations in …
managed substitution cipher. This is a cipher with single-layer permutated transformations in …