Articles with "encryption method" as a keyword



Photo by usgs from unsplash

An ASCII based effective and multi-operation image encryption method

Sign Up to like & get
recommendations!
Published in 2020 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-020-08897-4

Abstract: The main challenge for American Standard Code for Information Interchange (ASCII) based image encryption methods is to increase security with less computational cost. Earlier, well known image encryption techniques are not only deficient in performance… read more here.

Keywords: encryption method; ascii based; image encryption; image ... See more keywords
Photo by bugsster from unsplash

User Selective Encryption Method for Securing MANETs

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Electrical and Computer Engineering"

DOI: 10.11591/ijece.v8i5.pp3103-3111

Abstract: Security issue isĀ getting important day by day. At present, there are a variety of methodologies to provide protection for data confidentiality. MANETs have lots of security challenges than traditional networks like infrastructureless and self-organizing requirements.… read more here.

Keywords: encryption method; user selective; method; security ... See more keywords