[HTML][HTML] Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange

P Kumar, V Saxena - Journal of Computer and Communications, 2024 - scirp.org
Data security is a very important part of data transmission over insecure channels connected
through high-speed networks. Due to COVID-19, the use of data transmission over insecure …

[PDF][PDF] Secured IoT-WSN Architecture for Monitoring Environmental Pollution

K Akila, DDJ Evanjaline - … journal of Scientific & Technology Research … - cauverycollege.ac.in
The environment Pollution is the terrifying issue of this trendy world. A suitable requirement
is needed to monitor different environmental pollutions. Many researchers and volunteers …

[PDF][PDF] Four dimensional hyperchaotic communication system based on dynamic feedback synchronization technique for image encryption systems

HMM Alibraheemi, Q Al-Gayem… - International Journal of …, 2022 - researchgate.net
This paper presents the design and simulation of a hyperchaotic communication system
based on four dimensions (4D) Lorenz generator. The synchronization technique that used …

Tightening up security in low power deterministic networks

W Tiberti, B Vieira, H Kurunathan… - 2020 16th IEEE …, 2020 - ieeexplore.ieee.org
The unprecedented pervasiveness of IoT systems is pushing this technology into
increasingly stringent domains. Such application scenarios become even more challenging …

Cryptography for privacy in a resource-constrained IoT: A systematic literature review

F Mendoza-Cardenas, AJ Aparcana-Tasayco… - IEIE Transactions on …, 2022 - dbpia.co.kr
The Internet of Things (IoT) is intelligent devices connected to a network, which enables
collection, transmission, and processing of real-world data. IoT applications make extensive …

[PDF][PDF] Design and FPGA Implementation of High-Speed Cryptographic System for Wireless Communications Based on Multi-Dimensional Hyperchaotic Generator

HMM Alibraheemi, Q Al-Gayem, EAR Hussein - NeuroQuantology, 2022 - researchgate.net
In this paper, the design and Field Programmable Gate Array implementation of a new
algorithm for image encryption systems based on stream cipher using multi-dimensional …

[PDF][PDF] Generic Decision Support Model for Determining The Best Marketer

DN Utama, S Oktafiani - Advances in Science, Technology and …, 2020 - researchgate.net
For marketing company, determining the best marketing is a strategic decision. It is able to
affect the companys future purposefully. The study conducted to propose a novel decision …

[PDF][PDF] ENHANCED SECURITY AGAINST INTRUDER BASED ON BAFFLEMENT TECHNIQUE FOR WIRELESS SENSOR NETWORK USING TRACKING NODE WITH …

S Sowndeswari, E Kavitha - Journal of Data Acquisition and Processing, 2023 - sjcjycl.cn
Wireless Sensor Networks (WSN) provides extra vulnerabilities to overflow observer
intruders because of the revealed pattern of authority overloading via the leader node …

An Enhancement of Authentication and Energy Efficient Clustering Protocol for Wireless Sensor Network

AA Jasim - 2021 - search.proquest.com
Clustering is one of the popular techniques for Wireless Sensor Networks (WSNs) topology
management. In each cluster, a leader is selected referred to as cluster head while the rest …