Z Man - Chaos, Solitons & Fractals, 2023 - Elsevier
Biometric technology is increasingly being used in various areas, including government law enforcement, exit and entry management, visitor access control, user identification, and daily …
Chaos-based encryption algorithms uses a pseudorandom number generator (PRNG) to generate chaotic dynamics to carry out the processes to encrypt different types of …
In this work a real-time chaos-based speech encryption scheme designed for low-cost microcontroller implementation is presented. The method involves a two-step encryption …
Many real‐world applications, such as smart cities, industrial automation, health care, and so forth, utilize IoT‐enabled devices as a part of wireless networks. IoT devices must have …
Key expansion is an essential component in block cryptography, which serves the round function. By analyzing key expansion module of AES, it is found that the round-keys are …
This work aims to improves the chaotic behavior of classical logistic chaotic system for voice encryption. In this study, the classical chaotic system was enhanced. This enhanced map …
S Liao - … Journal of Advanced Computer Science & …, 2024 - search.ebscohost.com
This paper studies the encrypted access control method of smart medical multi-department information attributes in the cloud computing environment. Under the current wave of …