Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Energy-Aware Framework for Assessing Cryptographic Algorithms in Wireless Sensor Networks
Pooja, Shalu, Saini, Neha, Baghela, Vishwadeepak Singh, Khan, Mohd Anas
Published in SN computer science (01.04.2025)
Published in SN computer science (01.04.2025)
Get full text
Journal Article
Loading…
Hybrid quantum random number generator for cryptographic algorithms
Iavich, Maksim, Kuchukhidze, Tamari, Iashvili, Giorgi, Gnatyuk, Sergiy
Published in Radìoelektronnì ì komp'ûternì sistemi (Online) (29.11.2021)
Published in Radìoelektronnì ì komp'ûternì sistemi (Online) (29.11.2021)
Get full text
Journal Article
Loading…
Research and Implementation of MQTT Security Mechanism Based on Domestic Cryptographic Algorithms
Liu, Zechao, Liang, Tao, Sun, Ruochen, Hao, Zhiqiang, Li, Jun
Published in Ji suan ji ke xue (01.01.2024)
Get full text
Published in Ji suan ji ke xue (01.01.2024)
Journal Article
Loading…
Loading…
Cryptographic algorithms in IoT - a detailed analysis
Kaur, Pavandeep, Aggarwal, Shivani
Published in 2021 2nd International Conference on Computational Methods in Science & Technology (ICCMST) (01.12.2021)
Published in 2021 2nd International Conference on Computational Methods in Science & Technology (ICCMST) (01.12.2021)
Get full text
Conference Proceeding
Loading…
Russian Cryptographic Algorithms in the Identity Management Systems
A.V. Dubovitskaya, P. V. Smirnov
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.12.2011)
Get full text
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.12.2011)
Journal Article
Loading…
Loading…
Fault-tolerant backup storage system for confidential data in distributed servers
Tasmagambetov, Olzhas, Seitkulov, Yerzhan, Ospanov, Ruslan, Yergaliyeva, Banu
Published in Telkomnika (01.10.2023)
Published in Telkomnika (01.10.2023)
Get full text
Journal Article
Loading…
Loading…
High throughput fault-resilient AES architecture
Sheikhpour, Saeide, Mahani, Ali, Bagheri, Nasour
Published in Chronic diseases and translational medicine (01.07.2019)
Published in Chronic diseases and translational medicine (01.07.2019)
Get full text
Journal Article
Loading…
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
Kiraz, Mehmet Sabır
Published in Journal of ambient intelligence and humanized computing (01.10.2016)
Published in Journal of ambient intelligence and humanized computing (01.10.2016)
Get full text
Journal Article
Loading…
Loading…
Evaluation of different cryptographic algorithms on wireless sensor network nodes
Mansour, I., Chalhoub, G.
Published in 2012 International Conference on Wireless on Communications in Underground and Confined Areas (01.08.2012)
Published in 2012 International Conference on Wireless on Communications in Underground and Confined Areas (01.08.2012)
Get full text
Conference Proceeding
Loading…
Lattice-based cryptographic algorithms and their applications in protection of business-related data processing
Lalev, Angelin
Published in Proceedings of International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE) (01.01.2012)
Get full text
Published in Proceedings of International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE) (01.01.2012)
Conference Proceeding
Loading…
PERSEC -- Middleware for Multiple Encryption in Web Services
Araujo, Allan Delon Barbosa, Caetano da Silva, Paulo
Published in ITNG 2015 : proceedings : 12th International Conference on Information Technology: New Generations : 13-15 April 2015, Las Vegas, Nevada (01.04.2015)
Published in ITNG 2015 : proceedings : 12th International Conference on Information Technology: New Generations : 13-15 April 2015, Las Vegas, Nevada (01.04.2015)
Get full text
Conference Proceeding
Loading…
Status report on the first round of the development of the advanced encryption standard
Nechvatal, James, Barker, Elaine, Dodson, Donna, Dworkin, Morris, Foti, James, Roback, Edward
Published in Journal of research of the National Institute of Standards and Technology (01.09.1999)
Published in Journal of research of the National Institute of Standards and Technology (01.09.1999)
Get full text
Journal Article
Loading…
Loading…
Cryptographic Algorithm Based on Prime Assignment
Mahalakshmi, M.
Published in International journal for research in applied science and engineering technology (31.01.2022)
Published in International journal for research in applied science and engineering technology (31.01.2022)
Get full text
Journal Article
Loading…
Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm
Shah, Aayush, Mahato, Prabhat, Bhagat, Aadarsh
Published in International journal for research in applied science and engineering technology (31.08.2023)
Published in International journal for research in applied science and engineering technology (31.08.2023)
Get full text
Journal Article
Loading…
Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices
Mansoor, Khwaja, Afzal, Mehreen, Iqbal, Waseem, Abbas, Yawar
Published in Cluster computing (01.04.2025)
Published in Cluster computing (01.04.2025)
Get full text
Journal Article