Diffie-Hellman Algorithm for Securing Medical Record Data Encryption keys

YB Prastyo, IWW Pradnyana… - … , Multimedia, Cyber and …, 2020 - ieeexplore.ieee.org
Data security is an issue that must be a concern in the current era of information technology.
Medical data in the form of medical digital images is also important data to protect its …

Implementation of novel cryptographic technique for enhancing the cipher security for Resilient Infrastructure

FK Jabor, B Al-Attar, HAH Al Naffakh… - Full Length …, 2024 - americaspg.com
Cryptography is a well-known technology for providing confidential data transfer via
asymmetric or symmetric algorithms with public or private keys. Secure data transmission …

Evaluation on the method of restoring the complex communication environment in the field based on the complex low pressure platform simulation platform

J Jiang, W Zhu - International Journal of Emerging Electric Power …, 2024 - degruyter.com
In recent years, with the development of smart grids, people have increasingly high
requirements for the safety, stability, and reliability of smart grid operation. In actual …

FuzzyRSA-ChaosCrypt: Secure Text-to-Image Encryption for Communication

L Liaquat, N Aslam, K Abid, A Naeem… - Journal of Computing & …, 2023 - jcbi.org
Digital image encryption is crucial for user privacy while it is being shared over the internet.
Methods like steganography and encryption-decryption play a vital role in this objective …

Text Encryption using Transform Dimension, Bit Plane Slicing, and Chaos System

EH Rachmawanto, R Zulfiningrum… - … on Application for …, 2022 - ieeexplore.ieee.org
This study proposes the chaos 2D encryption method for text which is widely used in digital
images. For this method, two levels of dimensional transformation are carried out on text …

Digital signature algorithm based on ElGamal, Diffie-Hellman protocol and the number π

R Flores-Carapia, VM Silva-García… - 2023 - preprints.org
This research proposes an algorithm to sign messages using the ElGamal asymmetric
cryptosystem, called: Digital signature algorithm based on ElGamal, Diffie-Hellman protocol …

Image Encryption Algorithm Based on Combination Chaotic System and DNA Coding

P Mao, X Zhang, W Jiang - 2022 4th International Conference …, 2022 - ieeexplore.ieee.org
In order to increase the chaotic parameter range, improve the initial sensitivity of the chaotic
system and the security of the image encryption algorithm, This paper proposed a new …

Research on network security algorithms in distributed computing environment

JC Li, Q Wan, ZP Yu - … Conference on Internet of Things and …, 2023 - spiedigitallibrary.org
Distributed computing is a resource-centric computing paradigm. It connects all devices with
computing capabilities and utilizes idle computing resources in the network to divide and …

File Transfer on Cloud using Diffie-Hellman Key Exchange in Conjunction with AES Encryption

RB Deokar - 2023 - norma.ncirl.ie
The advent of internet communications has been widely adopted in recent times, with major
advancements being made in the field of technology. With such advances in technology …

A Novel Approach of Text Encryption Using Random Numbers and Hash Table

AK Das, N Kar - Advances in Cyber Security: Second International …, 2021 - Springer
In modern days, word files are used to carry out information storage and other multiple
operations. The word file allows the users to write valuable text and information in plain text …