Academic literature on the topic 'AES-256 Encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'AES-256 Encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "AES-256 Encryption"

1

Wade, Sahil. "Description of Image encryption Using AES-256 bits." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 7167–71. http://dx.doi.org/10.22214/ijraset.2023.53365.

Full text
Abstract:
Abstract: Image Encryption using AES Algorithm is a technique to secure the confidentiality of images. One of the most popular and secure encryption algorithms is the AES (Advanced Encryption Standard) algorithm. It is a symmetric encryption algorithm that encrypts data using a 128-bit block cipher. In this process, the image is first converted into a binary format. Then, a random 128-bit key is generated, which is used to create a sequence of subkeys that will be used for each round of encryption. The binary image is then divided into 128-bit blocks, and the encryption algorithm is applied to
APA, Harvard, Vancouver, ISO, and other styles
2

Shinde, K. A. "Pretty Good Privacy on Online Shopping." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03360.

Full text
Abstract:
ABSTRACT - This study investigates the integration of Pretty Good Privacy (PGP) encryption into e-commerce platforms, focusing on the use of RSA, AES and SHA-256 cryptographic algorithms. PGP enhances the security of online communications and transactions by combining symmetric encryption (AES), asymmetric encryption (RSA) and secure hashing (SHA-256). These mechanisms work together to ensure data confidentiality, authentication, and integrity. The paper presents the principles behind PGP, details the encryption and hashing techniques and examines their practical application in securing e-comm
APA, Harvard, Vancouver, ISO, and other styles
3

Ansh Goel, Harshit Baliyan, Shivam Tyagi, and Neeti Bansal. "End to end encryption of chat using advanced encryption standard-256." International Journal of Science and Research Archive 12, no. 1 (2024): 2018–25. http://dx.doi.org/10.30574/ijsra.2024.12.1.0923.

Full text
Abstract:
In an era marked by rampant digitalization and ubiquitous connectivity, ensuring the security and privacy of communications has become paramount. This paper introduces a novel application developed using Node.js, designed to address this pressing need by offering a secure means of converting plain text into cipher text. At its core, the application employs the Advanced Encryption Standard (AES) with a key length of 256 bits, a widely acclaimed cryptographic algorithm known for its robustness and reliability. The primary objective of this research is to provide a comprehensive solution for secu
APA, Harvard, Vancouver, ISO, and other styles
4

Gaur, Paavni. "AES Image Encryption (Advanced Encryption Standard)." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1357–63. http://dx.doi.org/10.22214/ijraset.2021.39542.

Full text
Abstract:
Abstract: An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round for key size of 256 bits is 14 , for 128 bits is 10 and for 192 bits is 12. As secret key increases the security as well as complexity of the cryptography algorithms. In this paper , an algorithm in which the image is
APA, Harvard, Vancouver, ISO, and other styles
5

Arek Satria, Bagas Piwari, and Tata Sutarbi. "Implementasi Algoritma Kriptografi AES untuk Keamanan Data pada Aplikasi Pesan Instan Berbasis Android." Jurnal Ilmiah Teknik Informatika dan Komunikasi 5, no. 2 (2025): 541–47. https://doi.org/10.55606/juitik.v5i2.1167.

Full text
Abstract:
This study uses AES-256 encryption to protect data in Android messaging apps. The algorithm works well, encrypting text messages in 0.05 seconds and multimedia files in 0.2 seconds, without affecting device resources. Testing confirms that AES-256 effectively protects user data while maintaining communication capabilities in real time. These findings provide valuable insights for developers seeking to enhance data protection in instant messaging platforms without compromising user experience. The solution offers an optimal balance between security and performance for mobile applications.
APA, Harvard, Vancouver, ISO, and other styles
6

Ravikiran, Dr P., M. Gnaneshwar, Enje Hepsibha, and Sudhesh Srivastav. "FPGA Implementation of 256-Bit Key AES Algorithm." International Journal for Research in Applied Science and Engineering Technology, no. 6 (June 30, 2024): 282–91. http://dx.doi.org/10.22214/ijraset.2024.63028.

Full text
Abstract:
Abstract: The most popular network security technique for secure data transmission between two end users, particularly over a public network, is the AES algorithm, also known as the Rijndael algorithm. It may be found in all kinds of wired and wireless digital communication networks AES, a network security technique, uses 256 bits on an FPGA. An authorized cryptographic technique that can be used to secure electronic data is the Advanced Encryption Standard technique (AES), which is specified by the National Institute of Standards and Technology. Because they provide faster and more flexible s
APA, Harvard, Vancouver, ISO, and other styles
7

Monica, Taris, Asep Id Hadiana, and Melina Melina. "QUESTION BANK SECURITY USING RIVEST SHAMIR ADLEMAN ALGORITHM AND ADVANCED ENCRYPTION STANDARD." JIKO (Jurnal Informatika dan Komputer) 7, no. 3 (2024): 175–81. https://doi.org/10.33387/jiko.v7i3.8654.

Full text
Abstract:
Data security is essential. Educational question banks at vocational high schools (SMK) contain confidential information that could be misused if not properly secured. This research aims to ensure students question bank data and develop a responsive web platform for Pusdikhubad Cimahi Vocational School by implementing the integration of the Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) cryptographic algorithms through the encryption and decryption process. AES is a symmetric key cryptography algorithm, while RSA is an encryption algorithm based on using public keys to encr
APA, Harvard, Vancouver, ISO, and other styles
8

Shivangi, Wadehra, Goel Shivam, and Sengar Nidhi. "AES Algorithm Encryption and Decryption." International Journal of Trend in Scientific Research and Development 2, no. 3 (2019): 1075–77. https://doi.org/10.31142/ijtsrd11221.

Full text
Abstract:
Advanced Encryption Standard AES algorithm is one of the most common and widely used symmetric block cipher algorithm. This algorithm has its own particular structure to encrypt and decrypt sensitive data and is applied in hardware and software, all over the world. It is extremely difficult for hackers to get the real data when encrypting by AES algorithm. In AES algorithm, encryption and decryption involves a number of rounds that depends on the length of the key and the number of block columns. So, to improve the strength of the AES the number of rounds is increased. Till date there is not a
APA, Harvard, Vancouver, ISO, and other styles
9

Patil, Paritosh S. "New Encryption Technique for Secure SMS Transmission." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 11 (2014): 1265–69. https://doi.org/10.5281/zenodo.14759441.

Full text
Abstract:
Short Message Service (SMS) is a very popular way for mobile phone and portable device users to send and receive simple text messages. Unfortunately, SMS is does not offer a secure environment for confidential data during transmission. This paper deals with an SMS encryption for mobile communication on Android message application. The transmission of an SMS in mobile communication is not secure, therefore it is desirable to secure SMS by additional encryption. In this paper, there is proposed the use of 3D-AES block cipher symmetric cryptography algorithm for SMS transfer securing. From the ex
APA, Harvard, Vancouver, ISO, and other styles
10

Putra, Jessa Syah, Rian Ardianto, and Purwono Purwono. "Tinjauan Terhadap Implementasi Advanced Encryption Standard 256 Dalam Keamanan Data." DEVICE : JOURNAL OF INFORMATION SYSTEM, COMPUTER SCIENCE AND INFORMATION TECHNOLOGY 5, no. 2 (2024): 335–55. https://doi.org/10.46576/device.v5i2.4621.

Full text
Abstract:
Penelitian ini membahas bagaimana algoritma Advanced Encryption Standard (AES) 256 dapat digunakan untuk melindungi data. Keamanan data menjadi semakin penting untuk mencegah penyalahgunaan dan pencurian data, terutama dalam komunikasi digital dan penyimpanan data sensitif, berkat kemajuan teknologi informasi. Metode penelitian yang digunakan adalah penelitian literatur dengan mengacu pada berbagai literatur dan jurnal yang relevan. Hasil penelitian menunjukkan bahwa algoritma enkripsi simetris AES-256 dapat dengan efektif mendekripsi dan mengenkripsi data sambil memastikan kerahasiaan, integr
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "AES-256 Encryption"

1

Li, Leibo, Keting Jia, and Xiaoyun Wang. "Improved Single-Key Attacks on 9-Round AES-192/256." In Fast Software Encryption. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46706-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kishor Kumar, R., M. H. Yogesh, K. Raghavendra Prasad, Sharankumar, and S. Sabareesh. "256-Bit AES Encryption Using SubBytes Blocks Optimisation." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-7954-7_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Geetha, N., and K. Mahesh. "RGB Component Encryption of Video Using AES-256 Bit Key." In Lecture Notes on Data Engineering and Communications Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24643-3_83.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rajangam, Vijayarajan, Shani S. Kumar, Sathiya Narayanan, Sangeetha N., and Avudaiammal R. "Medical Image Encryption Using Distance-Based Biokey Generation." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-4558-7.ch009.

Full text
Abstract:
As the internet of things and cloud computing create new technological revolutions in the field of healthcare, the issues such as security, privacy, authentication, the integrity of patient data, and medical images become sensitive. This chapter proposes a cryptographic technique for the secure storage of medical images based on biometric key generation. Cryptographic algorithms can be used to enhance the security of cloud storage systems. The proposed biometric-based encryption scheme takes the advantage of biometric features of the fingerprint and iris of the user to meet the desired security characteristics. A 256-bit bio-key is generated based on the distance between the fingerprint features and used in the advanced encryption standard (AES) for image encryption. The experiments conducted on the set of medical images also prove the effectiveness and security aspects of the proposed biometric key-based image encryption. The encryption method is also tested on the set of medical images and compared with other encryption schemes.
APA, Harvard, Vancouver, ISO, and other styles
5

Datta, Aparna, and Sanchayan Sen. "A Security and Privacy Validation Methodology for E-Health Systems Using Cloud Storage." In Advances in Human and Social Aspects of Technology. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-9235-5.ch009.

Full text
Abstract:
E-Health applications enable one to acquire, process, and share patient medical data to improve diagnosis, treatment, and patient monitoring. Despite the undeniable benefits brought by the digitization of health systems, the transmission of and access to medical information raises critical issues, mainly related to security and privacy. This paper describes a safe e-health data management system that employs the MERN stack (MongoDB, Express, React, and Node.js) and strong encryption algorithms. The solution improves security by using client-side encryption with the AES-256-CBC technique to encrypt e-health files before uploading them to MongoDB. To improve security, encrypted files and keys are stored separately. User authentication employs bcryptjs for password hashing and JSON Web Tokens (JWT) for permission, ensuring that only authorized users can access and decrypt data. The study demonstrates the efficiency of coupling MERN stack development with encryption in protecting sensitive patient information, establishing confidence, and boosting the adoption of e-health solutions.
APA, Harvard, Vancouver, ISO, and other styles
6

Pakhomchik, Alexey, and Valerii Vinokur. "Potential Vulnerabilities of Cryptoalgorithms in the World of Ideal Quantum Annealers." In The Role of Cybersecurity in the Industry 5.0 Era [Working Title]. IntechOpen, 2024. http://dx.doi.org/10.5772/intechopen.114973.

Full text
Abstract:
In the evolving landscape of cybersecurity, the emergence of quantum annealers presents a formidable challenge to rely on existing cryptographic algorithms such as Secure Hash Algorithm (SHA-256) and Advanced Encryption Standard (AES). Building on our findings in cryptanalysis, our work explores the potential vulnerabilities these quantum technologies pose to existing cryptographic methods. We investigate how the transformation of cryptographic problems into quadratic unconstrained binary optimization (QUBO) format, suitable for quantum annealing, could expedite the decryption processes, thereby undermining the security of widely used algorithms. The implications for industries relying on these cryptographic standards are profound. From financial transactions to secure communications, the threat of quantum annealing necessitates a re-evaluation of current security protocols and the acceleration of developing quantum-resistant cryptographic techniques. This chapter aims to provide industry stakeholders with a comprehensive understanding of these emerging threats and outline recipes for urgent proactive measures in the face of quantum advances.
APA, Harvard, Vancouver, ISO, and other styles
7

Ammari, Faisal Tawfiq, and Joan Lu. "Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques." In Securing the Internet of Things. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9866-4.ch039.

Full text
Abstract:
The eXtensible Markup Language (XML) has been widely adopted in many financial institutions in their daily transactions. This adoption was due to the flexible nature of XML providing a common syntax for systems messaging in general and in financial messaging in specific. Excessive use of XML in financial transactions messaging created an aligned interest in security protocols integrated into XML solutions in order to protect exchanged XML messages in an efficient yet powerful mechanism. However, financial institutions (i.e. banks) perform large volume of transactions on daily basis which require securing XML messages on large scale. Securing large volume of messages will result performance and resource issues. Therefore, an approach is needed to secure specified portions of an XML document, syntax and processing rules for representing secured parts. In this research we have developed a smart approach for securing financial XML transactions using effective and intelligent fuzzy classification techniques. Our approach defines the process of classifying XML content using a set of fuzzy variables. Upon fuzzy classification phase, a unique value is assigned to a defined attribute named “Importance Level”. Assigned value indicates the data sensitivity for each XML tag. The research also defines the process of securing classified financial XML message content by performing element-wise XML encryption on selected parts defined in fuzzy classification phase. Element-wise encryption is performed using symmetric encryption using AES algorithm with different key sizes. Key size of 128-bit is being used on tags classified with “Medium” importance level; a key size of 256-bit is being used on tags classified with “High” importance level. An implementation has been performed on a real-life environment using online banking system in Jordan Ahli Bank one of the leading banks in Jordan to demonstrate its flexibility, feasibility, and efficiency. Our experimental results of the system verified tangible enhancements in encryption efficiency, processing-time reduction, and resulting XML message sizes. Finally, our proposed system was designed, developed, and evaluated using a live data extracted from an internet banking service in one of the leading banks in Jordan. The results obtained from our experiments are promising, showing that our model can provide an effective yet resilient support for financial systems to secure exchanged financial XML messages.
APA, Harvard, Vancouver, ISO, and other styles
8

Ammari, Faisal Tawfiq, and Joan Lu. "Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques." In Ontologies and Big Data Considerations for Effective Intelligence. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2058-0.ch007.

Full text
Abstract:
The eXtensible Markup Language (XML) has been widely adopted in many financial institutions in their daily transactions. This adoption was due to the flexible nature of XML providing a common syntax for systems messaging in general and in financial messaging in specific. Excessive use of XML in financial transactions messaging created an aligned interest in security protocols integrated into XML solutions in order to protect exchanged XML messages in an efficient yet powerful mechanism. However, financial institutions (i.e. banks) perform large volume of transactions on daily basis which require securing XML messages on large scale. Securing large volume of messages will result performance and resource issues. Therefore, an approach is needed to secure specified portions of an XML document, syntax and processing rules for representing secured parts. In this research we have developed a smart approach for securing financial XML transactions using effective and intelligent fuzzy classification techniques. Our approach defines the process of classifying XML content using a set of fuzzy variables. Upon fuzzy classification phase, a unique value is assigned to a defined attribute named “Importance Level”. Assigned value indicates the data sensitivity for each XML tag. The research also defines the process of securing classified financial XML message content by performing element-wise XML encryption on selected parts defined in fuzzy classification phase. Element-wise encryption is performed using symmetric encryption using AES algorithm with different key sizes. Key size of 128-bit is being used on tags classified with “Medium” importance level; a key size of 256-bit is being used on tags classified with “High” importance level. An implementation has been performed on a real-life environment using online banking system in Jordan Ahli Bank one of the leading banks in Jordan to demonstrate its flexibility, feasibility, and efficiency. Our experimental results of the system verified tangible enhancements in encryption efficiency, processing-time reduction, and resulting XML message sizes. Finally, our proposed system was designed, developed, and evaluated using a live data extracted from an internet banking service in one of the leading banks in Jordan. The results obtained from our experiments are promising, showing that our model can provide an effective yet resilient support for financial systems to secure exchanged financial XML messages.
APA, Harvard, Vancouver, ISO, and other styles
9

Dyriavko, Oleh. "MODELS AND SOFTWARE TOOLS FOR FORECASTING AND MANAGING FINANCIAL RISKS." In Science, technology and innovation in the context of global transformation. Publishing House “Baltija Publishing”, 2024. https://doi.org/10.30525/978-9934-26-499-3-8.

Full text
Abstract:
The section presents modern models and software tools for analysis, forecasting and management of financial risks. Mathematical approaches such as regression analysis, time series models (ARIMA, GARCH), scenario analysis, stress testing and portfolio optimization using the Markowitz model are considered. Special attention is paid to machine learning methods, including Random Forest, Gradient Boosting and neural networks, which provide high accuracy of forecasts and detection of hidden dependencies in data. The use of modular and microservice architectures is proposed for the development of systems that integrate big data analysis, optimization and visualization tools. The stages of data processing, the application of containerization (Docker, Kubernetes), as well as deployment automation (CI/CD) using cloud platforms (AWS, Azure, Google Cloud) are described in detail. Special attention is paid to security issues, including data encryption (AES-256), access control (RBAC, MFA) and system monitoring. The presented quantitative and qualitative assessments of the effectiveness of methods and models demonstrate the possibilities of reducing risks and increasing the resilience of financial systems. The chapter can become a basis for researchers, analysts and developers involved in creating financial modeling software, as well as for developing risk management strategies in changing economic conditions. The purpose of this research is to create an integrated approach to forecasting and managing financial risks by developing modern mathematical models, applying machine learning methods and implementing advanced software engineering tools. The research is aimed at improving tools for time series analysis, portfolio optimization, risk classification and forecasting using algorithms such as Random Forest, neural networks and GARCH. Particular attention is paid to the development of scalable software systems with modular and microservice architecture, integrated with cloud platforms to provide real-time processing of big data. An important aspect is ensuring the security of financial data through encryption, access control and monitoring, as well as the creation of interactive visualization tools to support decision-making. The results of the research are aimed at increasing the accuracy, efficiency and reliability of solutions in the field of financial modeling. The methodology presented in this article is based on a review of current technical and software solutions for controlling unmanned aerial vehicles (UAVs), focusing on hardware platforms, sensors, communication systems, and software. Comparative analysis of hardware platforms (FPGA, ARM, Atmel, Raspberry Pi) on key parameters: performance, flexibility, power consumption, complexity and cost. Software evaluations that include open platforms (ArduPilot, PX4, LibrePilot) and high-level control systems (Aerostack2, GAAS). Integration of sensor data using machine learning algorithms, such as the Kalman filter, to improve navigation accuracy and flight stability. Modeling of UAV energy consumption taking into account cargo weight, route length and quadratic growth due to aerodynamic drag. Analysis of multi-agent systems for drone group coordination, including trajectory modeling and motion synchronization. A graphical representation of the data that demonstrates a comparison of platforms, trajectories and energy consumption patterns The scientific novelty of the research lies in the integration of modern mathematical methods, machine learning algorithms and software engineering to solve the problems of forecasting and managing financial risks. A combination of traditional models, such as ARIMA, GARCH and regression analysis, with deep learning methods is proposed, which provides increased forecasting accuracy and adaptability to market changes. The use of microservice architecture and cloud platforms allows you to create scalable systems for processing large amounts of data in real time. An innovative approach to financial data protection has been implemented, including encryption, access control and monitoring, and interactive visualization tools have been developed that facilitate rapid analysis of results and decision-making. The research offers a comprehensive approach to risk management, focused on solving current problems in the financial sector using advanced technologies. Results. The research achieved a number of significant results that ensure increased efficiency and accuracy of financial risk forecasting. Mathematical models, in particular ARIMA and GARCH, were developed and integrated, allowing for detailed analysis of time series and assessment of financial indicator volatility. The use of machine learning algorithms, such as Random Forest, Gradient Boosting, and neural networks, ensured forecasting accuracy of up to 90% when analyzing risk portfolios and scenarios. Microservice architecture became the basis for creating scalable systems that easily adapt to changing market conditions, and cloud platforms (AWS, Azure, Google Cloud) provided high computing power and availability. Containerization using Docker and Kubernetes significantly simplified the management of system components and their integration. Interactive visualization tools, such as risk heat maps and interactive dashboards, were developed to simplify the analysis of complex financial data and facilitate informed decision-making. Ensuring data security through the implementation of encryption (AES-256), multi-level access (RBAC) and monitoring systems has increased the security of confidential information. Stress testing and scenario analysis have allowed us to assess the impact of extreme events on financial systems, develop strategies to reduce losses and ensure the stability of portfolios. The developed methods have demonstrated effectiveness in changing market conditions, confirming their value for analysts, financial institutions and software developers.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "AES-256 Encryption"

1

Nareswara, Muhammad Dzikri Pandu, Hilal Huda, and Sutiyo. "Secure Implementation of Population Data Encryption for Village Websites Using Advanced Encryption Standard (AES-256)." In 2024 IEEE 22nd Student Conference on Research and Development (SCOReD). IEEE, 2024. https://doi.org/10.1109/scored64708.2024.10872676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

S, Akash, and S. Gokila. "Secure Multi-Factor One-Time Password Generation using PyOTP, SHA-512, and AES-256 Encryption." In 2025 Third International Conference on Augmented Intelligence and Sustainable Systems (ICAISS). IEEE, 2025. https://doi.org/10.1109/icaiss61471.2025.11041781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rajab, Aufa Yuslizar, Windarto, Achmad Solichin, Mohammad Syafrullah, Hendri Irawan, and Lauw Li Hin. "Implementation of Advanced Encryption Standard (AES) 256 Algorithm on WEB Based Application for Protecting Sensitive Data on MIKROTIK CCR 1009 VPNIP Device." In 2024 International Conference on Intelligent Cybernetics Technology & Applications (ICICyTA). IEEE, 2024. https://doi.org/10.1109/icicyta64807.2024.10912985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alkhyeli, Mohammed, Shaheen Alkhyeli, Khalifa Aldhaheri, and Hanane Lamaazi. "Secure Chat Room Application Using AES-GCM Encryption and SHA-256." In 2023 15th International Conference on Innovations in Information Technology (IIT). IEEE, 2023. http://dx.doi.org/10.1109/iit59782.2023.10366418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hashim, Jibran, Arsalan Hameed, Muhammad Jamshed Abbas, Muhammad Awais, Hassaan Aziz Qazi, and Sohail Abbas. "LSB Modification based Audio Steganography using Advanced Encryption Standard (AES-256) Technique." In 2018 12th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS). IEEE, 2018. http://dx.doi.org/10.1109/macs.2018.8628458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Amelia, Fetty, and Muhammad Fahmi Ramadhani. "LoRa-Based Asset Tracking System with Data Encryption Using AES-256 Algorithm." In 2022 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET). IEEE, 2022. http://dx.doi.org/10.1109/icramet56917.2022.9991210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Khairunisa, Isma, and Herman Kabetta. "PHP Source Code Protection Using Layout Obfuscation and AES-256 Encryption Algorithm." In 2021 6th International Workshop on Big Data and Information Security (IWBIS). IEEE, 2021. http://dx.doi.org/10.1109/iwbis53353.2021.9631842.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yumang, Analyn N., Ericson D. Dimaunahan, Clifford Khyle M. Centino, and Adrian Robert J. Doroteo. "IoT-based Fire Mitigation and Detection System with AES-256 Encryption and Android Application." In 2023 2nd International Symposium on Sensor Technology and Control (ISSTC). IEEE, 2023. http://dx.doi.org/10.1109/isstc59603.2023.10281116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Andriani, Ria, Stevi Ema Wijayanti, and Ferry Wahyu Wibowo. "Comparision Of AES 128, 192 And 256 Bit Algorithm For Encryption And Description File." In 2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE). IEEE, 2018. http://dx.doi.org/10.1109/icitisee.2018.8720983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rapolu, Ravi Teja, Madhavaram Krishna Gopal, and GAE Satish Kumar. "A Secure method for Image Signaturing using SHA-256, RSA, and Advanced Encryption Standard (AES)." In 2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE). IEEE, 2022. http://dx.doi.org/10.1109/icdcece53908.2022.9792989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!