Articles with "data encryption" as a keyword



Photo from wikipedia

Fluorescence Lifetime Tunable Water Resistant Perovskite Quantum Dots for Multidimensional Encryption.

Sign Up to like & get
recommendations!
Published in 2020 at "ACS applied materials & interfaces"

DOI: 10.1021/acsami.0c10869

Abstract: Using temporal dimension in optical multiplexing is a promising method to increase the security of data encryption. However, adjusting the fluorescence lifetime of light emitting material often results in inevitable changes in their fluorescence spectra,… read more here.

Keywords: perovskite quantum; fluorescence; encryption; data encryption ... See more keywords
Photo from wikipedia

Facile and Equipment-Free Data Encryption and Decryption by Self-Encrypting Pt(II) Complex.

Sign Up to like & get
recommendations!
Published in 2019 at "ACS applied materials & interfaces"

DOI: 10.1021/acsami.8b21221

Abstract: Luminescence switching materials are vital to various data security-related techniques, including data encryption-decryption. Here, we report a family of pseudopolymorphs based on a diimine-platinum(II) complex, Pt(Me3SiC≡CbpyC≡CSiMe3)(C≡CC6H4Br-3)2 (1), and systematically studied the influence of stacking modes… read more here.

Keywords: encryption decryption; equipment free; encryption; data encryption ... See more keywords
Photo from wikipedia

Data storage and encryption with a high security level based on molecular configurational isomers.

Sign Up to like & get
recommendations!
Published in 2022 at "Soft matter"

DOI: 10.1039/d2sm00890d

Abstract: Developing advanced materials for highly secure data-encryption is crucial but very challenging, as most data-encryption materials (the message area) are chemically different from the substrates (the background) on which they are being written, leading to… read more here.

Keywords: data security; data encryption; encryption; level ... See more keywords
Photo from wikipedia

A Multi-Layered Data Encryption and Decryption Scheme Based on Genetic Algorithm and Residual Numbers

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2997838

Abstract: Over the years, Steganography and Cryptography have been complementary techniques for enforcing security of digital data. The need for the development of robust multi-layered schemes to counter the exponential grow in the power of computing… read more here.

Keywords: genetic algorithm; proposed scheme; scheme; multi layered ... See more keywords
Photo by henrylim from unsplash

Chaotic Constellation Mapping for Physical-Layer Data Encryption in OFDM-PON

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Photonics Technology Letters"

DOI: 10.1109/lpt.2018.2789468

Abstract: A physical-layer encryption scheme is proposed and experimentally demonstrated in orthogonal frequency division multiplexing passive optical network (OFDM-PON). In the proposed multifold encryption scheme, quadratic-amplitude modulation (QAM) symbols are scrambled and distributed onto the complex… read more here.

Keywords: physical layer; ofdm pon; encryption; chaotic constellation ... See more keywords
Photo from wikipedia

Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Scheduling

Sign Up to like & get
recommendations!
Published in 2017 at "Bulletin of Electrical Engineering and Informatics"

DOI: 10.11591/eei.v6i3.627

Abstract: Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography… read more here.

Keywords: chaotic rivest; algorithm; system; encryption standard ... See more keywords