Articles with "encryption standard" as a keyword



Photo by nci from unsplash

Novel secure surgical telepresence using enhanced advanced encryption standard: during, pre and post surgery

Sign Up to like & get
recommendations!
Published in 2020 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-020-08656-5

Abstract: Security during surgical telepresence has not yet been sufficiently considered. This paper aims to propose a solution to enhance security during surgery between the site of surgery (local site) and the site that hosts the… read more here.

Keywords: surgery; proposed system; advanced encryption; encryption standard ... See more keywords
Photo from wikipedia

A Novel Image Encryption Technique Based on Generalized Advanced Encryption Standard Based on Field of Any Characteristic

Sign Up to like & get
recommendations!
Published in 2019 at "Wireless Personal Communications"

DOI: 10.1007/s11277-019-06594-6

Abstract: The privacy of digital contents is one of the most important issue of the digitally advanced world. The transmission of online information is increasing immensely from last one decade. As the technology evolving with the… read more here.

Keywords: image encryption; image; encryption standard; advanced encryption ... See more keywords
Photo from wikipedia

R2R-CSES: proactive security data process using random round crypto security encryption standard in cloud environment

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-01860-z

Abstract: Cloud service provide the information security to protect the data using broad set of privacy policies and controls. Various security mechanisms concentrates the reality of key leakage issues to deal the security policy. The problem… read more here.

Keywords: proactive security; security encryption; encryption standard; security ... See more keywords
Photo from wikipedia

Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Scheduling

Sign Up to like & get
recommendations!
Published in 2017 at "Bulletin of Electrical Engineering and Informatics"

DOI: 10.11591/eei.v6i3.627

Abstract: Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography… read more here.

Keywords: chaotic rivest; algorithm; system; encryption standard ... See more keywords
Photo by austindistel from unsplash

An advance encryption standard cryptosystem in IoT transaction

Sign Up to like & get
recommendations!
Published in 2020 at "Indonesian Journal of Electrical Engineering and Computer Science"

DOI: 10.11591/ijeecs.v17.i3.pp1548-1554

Abstract: IoT create an ecosystem that can be useful to the world with its various services. That make the security of IoT is more important. This paper presents a proposed technique to secure data transaction from… read more here.

Keywords: standard cryptosystem; transaction; advance encryption; encryption standard ... See more keywords

Implementation of image file security using the advanced encryption standard method

Sign Up to like & get
recommendations!
Published in 2023 at "Indonesian Journal of Electrical Engineering and Computer Science"

DOI: 10.11591/ijeecs.v31.i1.pp562-569

Abstract: The application of technology in this era has entered digitalization and is modern. Therefore, we are already in an era of advanced and rapid technological development. It has become a human need to exchange information… read more here.

Keywords: information; method; document; security ... See more keywords
Photo by christianw from unsplash

Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant

Sign Up to like & get
recommendations!
Published in 2018 at "Advances in Mechanical Engineering"

DOI: 10.1177/1687814018781638

Abstract: In recent years, the need to develop advanced information technology systems in the area of mechanical engineering has been growing continuously to deliver better product quality at reduced cost. Embedding the electronics and software with… read more here.

Keywords: irreducible polynomial; advanced encryption; dynamic irreducible; encryption standard ... See more keywords