Journal articles on the topic 'To ensure the security analysis of the algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'To ensure the security analysis of the algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gong, Qianru. "Application Research of Data Encryption Algorithm in Computer Security Management." Wireless Communications and Mobile Computing 2022 (July 14, 2022): 1–7. http://dx.doi.org/10.1155/2022/1463724.
Full textFasila, Kasfa Ali, and Mathew Sheena. "An efficient lightweight key exchange algorithm for internet of things applications." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5609–18. https://doi.org/10.11591/ijece.v12i5.pp5609-5618.
Full textSevin, Abdullah, and Ünal Çavuşoğlu. "Design and Performance Analysis of a SPECK-Based Lightweight Hash Function." Electronics 13, no. 23 (2024): 4767. https://doi.org/10.3390/electronics13234767.
Full textYang, Er Song, Lin You, Zhen Dong Wu, and Wang Ke Yu. "Massive Data Hybrid Encryption Algorithm Based on Cloud Computing." Applied Mechanics and Materials 651-653 (September 2014): 1864–67. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1864.
Full textKasfa Ali, Fasila, and Sheena Mathew. "An efficient lightweight key exchange algorithm for internet of things applications." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5609. http://dx.doi.org/10.11591/ijece.v12i5.pp5609-5618.
Full textMuhammad, Aina’u Shehu, and Fatih Özkaynak. "SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs." Symmetry 13, no. 5 (2021): 824. http://dx.doi.org/10.3390/sym13050824.
Full textSholikhatin, Siti Alvi, Adam Prayogo Kuncoro, Afifah Lutfia Munawaroh, and Gilang Aji Setiawan. "Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security." Edu Komputika Journal 9, no. 1 (2023): 60–67. http://dx.doi.org/10.15294/edukomputika.v9i1.57389.
Full textHarfoushi, Osama, and Ruba Obiedat. "Security in Cloud Computing Using Hash Algorithm: A Neural Cloud Data Security Model." Modern Applied Science 12, no. 6 (2018): 143. http://dx.doi.org/10.5539/mas.v12n6p143.
Full textSantoso, Zikri Akmal, Mohammad Andri Budiman, and Syahril Efendi. "A Hybrid Cryptosystem Using Rprime RSA And Extended Tiny Encryption (XTEA) For Securing Message." Data Science: Journal of Computing and Applied Informatics 9, no. 1 (2025): 18–31. https://doi.org/10.32734/jocai.v9.i1-16574.
Full textChen, Runyu, Lunwen Wang, Chuang Peng, and Rangang Zhu. "An Effective Sharding Consensus Algorithm for Blockchain Systems." Electronics 11, no. 16 (2022): 2597. http://dx.doi.org/10.3390/electronics11162597.
Full textYang, Bin, Ren Yi Fu, Jian Zhong Diao, and Hui Rong Liu. "Security Mechanisms Analysis for ZigBee Standard Based on AES-CCM*." Advanced Materials Research 468-471 (February 2012): 1359–62. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1359.
Full textShi, Qiaolian, and Yan Liu. "Data Encryption Technology Analysis of Robot Computer Network Information." Journal of Sensors 2022 (July 15, 2022): 1–7. http://dx.doi.org/10.1155/2022/5127989.
Full textAnjaneyulu, Endurthi, and Khare Akhil. "Design and Analysis of Efficient Consensus Algorithms to Enhance the Security and Performance of Blockchain." International Journal of Novel Research in Computer Science and Software Engineering 11, no. 3 (2024): 41–56. https://doi.org/10.5281/zenodo.14012653.
Full textGe, Xin, Bin Lu, Fenlin Liu, and Daofu Gong. "An Image Encryption Algorithm Based on Information Hiding." International Journal of Bifurcation and Chaos 26, no. 11 (2016): 1650192. http://dx.doi.org/10.1142/s0218127416501923.
Full textTahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.
Full textAzarenko, O., Yu Honcharenko, M. Diviziniuk, R. Shevchenko, and O. Shevchenko. "CONTROL ALGORITHM FOR IMPLEMENTING THE MATHEMATICAL MODEL OF SCENARIO MANAGEMENT AS A TOOL FOR ENSURING SECURITY OF A STRATEGIC FACILITY." Municipal economy of cities 3, no. 184 (2024): 196–203. http://dx.doi.org/10.33042/2522-1809-2024-3-184-196-203.
Full textSomnath, Dey *1 Somnath Basak 2. "ACHIEVING SECURITY IN CLOUD COMPUTING THROUGH ADVANCED RSA ALGORITHM AND PERFORMANCE ANALYSIS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 12 (2017): 519–25. https://doi.org/10.5281/zenodo.1130846.
Full textZhang, Daike, Junyang Chen, Yihui He, et al. "A Chunked and Disordered Data Privacy Protection Algorithm: Application to Resource Platform Systems." Applied Sciences 13, no. 10 (2023): 6017. http://dx.doi.org/10.3390/app13106017.
Full textMuthumarilakshmi, S., G. Mahalakshmi, R. Poornima Lakshmi, and C. S. Dhanalakshmi. "Boosting 6G Network Security Using a High-Performance Adaptive Threat Detection Algorithm (ATDA)." Journal of Neonatal Surgery 14, no. 5 (2025): 238–48. https://doi.org/10.52783/jns.v14.2929.
Full textJiao, Wen Zhe, and Xiao Xue Ye. "A Cloud Architecture for Service Security Management." Applied Mechanics and Materials 416-417 (September 2013): 1413–17. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1413.
Full textHussain, Munir, Amjad Mehmood, Muhammad Altaf Khan, Rabia Khan, and Jaime Lloret. "Reputation-Based Leader Selection Consensus Algorithm with Rewards for Blockchain Technology." Computers 14, no. 1 (2025): 20. https://doi.org/10.3390/computers14010020.
Full textSalankar, Pritam, Vinay Avasthi, and Ashutosh Pasricha. "Analysis and Validation of Lightweight Authentication Algorithm." Ingénierie des systèmes d information 27, no. 4 (2022): 637–43. http://dx.doi.org/10.18280/isi.270414.
Full textKhan, Burhan Ul Islam, Rashidah Funke Olanrewaju, Malik Arman Morshidi, Roohie Naaz Mir, Miss Laiha Binti Mat Kiah, and Abdul Mobeen Khan. "EVOLUTION AND ANALYSIS OF SECURED HASH ALGORITHM (SHA) FAMILY." Malaysian Journal of Computer Science 35, no. 3 (2022): 179–200. http://dx.doi.org/10.22452/mjcs.vol35no3.1.
Full textJaiswal, Shruti, Himani Bansal, Shiv Naresh Shivhare, and Gulshan Shrivastava. "A Novel IoT Framework for Identifying and Mitigating Security Threats." Scalable Computing: Practice and Experience 26, no. 5 (2025): 2165–83. https://doi.org/10.12694/scpe.v26i5.4909.
Full textLi, Ming, and Yange Yue. "Security Analysis and Improvement of Dual Watermarking Framework for Multimedia Privacy Protection and Content Authentication." Mathematics 11, no. 7 (2023): 1689. http://dx.doi.org/10.3390/math11071689.
Full textZhang, Xing, Shaoyu Tang, Tianning Li, Xiaowei Li, and Changda Wang. "GFRX: A New Lightweight Block Cipher for Resource-Constrained IoT Nodes." Electronics 12, no. 2 (2023): 405. http://dx.doi.org/10.3390/electronics12020405.
Full textBaranov, Igor. "Symmetric Block Algorithm WBC1 and Analysis of Its Implementation Complexity." Cybernetics and Computer Technologies, no. 1 (March 28, 2025): 64–73. https://doi.org/10.34229/2707-451x.25.1.6.
Full textALTAF HUSSAIN, SAKIINAH, AZNI HASLIZAN AB HALIM, and NAJWA HAYAATI MOHD ALWI. "SYSTEMATIC LITERATURE REVIEW FOR LIGHTWEIGHT AUTHENTICATION ALGORITHM IN THE IoT." JOURNAL OF SUSTAINABILITY SCIENCE AND MANAGEMENT 17, no. 9 (2022): 162–78. http://dx.doi.org/10.46754/jssm.2022.09.011.
Full textКныш, Александр Викторович, Дмитрий Александрович Кобзев, Оксана Николаевна Давиденко, et al. "Application of source code static analysis methods to ensure security of APCS." SCIENCE & TECHNOLOGIES OIL AND OIL PRODUCTS PIPELINE TRANSPORTATION, no. 3 (August 25, 2021): 346–56. http://dx.doi.org/10.28999/2541-9595-2021-11-3-346-356.
Full textSaidi, Riad, Tarek Bentahar, Nada Cherrid, Atef Bentahar, and Hichem Mayache. "Evaluation and Analysis of Interferograms from an InSAR Radar Encrypted by an AES-Based Cryptosystem with The Five Encryption Modes." International Journal on Electrical Engineering and Informatics 12, no. 4 (2020): 912–32. http://dx.doi.org/10.15676/ijeei.2020.12.4.13.
Full textGoel, Vikas, and Amit Kumar Goyal. "An Improved Analysis of Secured Permutation and Substitution based Image Encryption." Journal of Cybersecurity and Information Management 12, no. 1 (2023): 30–40. http://dx.doi.org/10.54216/jcim.120103.
Full textMeng, Fanqi, and Zhenglan Gu. "A Color Image-Encryption Algorithm Using Extended DNA Coding and Zig-Zag Transform Based on a Fractional-Order Laser System." Fractal and Fractional 7, no. 11 (2023): 795. http://dx.doi.org/10.3390/fractalfract7110795.
Full textXiao, Shenyong, ZhiJun Yu, and YaShuang Deng. "Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism." Security and Communication Networks 2020 (March 16, 2020): 1–12. http://dx.doi.org/10.1155/2020/7913061.
Full textSable, Nilesh P., Vijay U. Rathod, Pallavi Parlewar, Smita B. Rathod, Santosh T. Waghmode, and Rahul R. Rathod. "Efficient lightweight cryptography for resource-constrained WSN nodes." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2 (2024): 349–59. http://dx.doi.org/10.47974/jdmsc-1888.
Full textHu, Fang, and Yuhua Liu. "Multi-index algorithm of identifying important nodes in complex networks based on linear discriminant analysis." Modern Physics Letters B 29, no. 03 (2015): 1450268. http://dx.doi.org/10.1142/s0217984914502686.
Full textMS., NAMITA GEORGE GONSALVES. "PERFORMANCE ANALYSIS OF SECURED COMMUNICATION WITH CRYPTOGRAPHY USING FIBONACCI SERIES." IJIERT - International Journal of Innovations in Engineering Research and Technology 4, no. 7 (2017): 42–46. https://doi.org/10.5281/zenodo.1459057.
Full textRazaq, Abdul, Louai A. Maghrabi, Musheer Ahmad, and Qamar H. Naith. "Novel substitution-box generation using group theory for secure medical image encryption in E-healthcare." AIMS Mathematics 9, no. 3 (2024): 6207–37. http://dx.doi.org/10.3934/math.2024303.
Full textLahraoui, Younes, Saiida Lazaar, Youssef Amal, and Abderrahmane Nitaj. "Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance." Cryptography 8, no. 2 (2024): 23. http://dx.doi.org/10.3390/cryptography8020023.
Full textZhang, Xinyue, Daoguang Mu, Wenzheng Zhang, and Xinfeng Dong. "Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework." Cryptography 9, no. 1 (2025): 18. https://doi.org/10.3390/cryptography9010018.
Full textLiu, Weigang. "Computer Network Confidential Information Security Based on Big Data Clustering Algorithm." Wireless Communications and Mobile Computing 2022 (June 9, 2022): 1–10. http://dx.doi.org/10.1155/2022/4927504.
Full textShibaikin, Sergei, Vladimir Nikulin, and Andrei Abbakumov. "Analysis of machine learning methods for computer systems to ensure safety from fraudulent texts." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2020, no. 1 (2020): 29–40. http://dx.doi.org/10.24143/2072-9502-2020-1-29-40.
Full textWishah, Raed, and Azmi Shawkat Abdulbaqi. "Security and integrity of medical log records management in the cloud storage." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 7 (2023): 1961–70. http://dx.doi.org/10.47974/jdmsc-1784.
Full textBo, Jiao, and Manual Selvaraj Bexci. "New algorithm to ensure virtual simulation data security based on deep learning using applied innovation design." International Journal of Applied Science and Engineering 21, no. 1 (2023): 1–9. http://dx.doi.org/10.6703/ijase.202403_21(1).002.
Full textB M, Chandrakala, and S. C. Lingareddy. "Proxy Re-Encryption in cloud using ALBC (adaptive lattice based cryptography)." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 3 (2019): 1455. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1455-1463.
Full textLi, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (2020): 916. http://dx.doi.org/10.3390/s20030916.
Full textSihombing, Grace Lamudur Arta. "HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (2017): 75–83. http://dx.doi.org/10.30743/infotekjar.v1i2.66.
Full textPriya, Chandrasekar, Kesavan Kumuthapriya, Savarimuthu Sagayamary, L. M. Merlin Livingston, and Marimuthu Venkatesan. "To ensure public safety internet of things and convolutional neural network algorithm for a surveillance system enabled with 5G." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 4 (2025): 4268. https://doi.org/10.11591/ijece.v15i4.pp4268-4278.
Full textAkilan Selvaraj Saroja. "Advancing Security in Lightweight S-WBSN for E-Healthcare." Journal of Electrical Systems 20, no. 10s (2024): 8187–211. http://dx.doi.org/10.52783/jes.7059.
Full textSaurabh. "Security Enhancement for IoT using Mutual Authentication Based Lightweight Algorithm." Advances in Nonlinear Variational Inequalities 28, no. 1s (2024): 479–505. https://doi.org/10.52783/anvi.v28.2448.
Full textYang, Xiaodong, Aijia Chen, Zhisong Wang, and Shudong Li. "Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption." Security and Communication Networks 2022 (May 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/2204832.
Full text