[HTML][HTML] A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays

K Kumar, KR Ramkumar, A Kaur - … of King Saud University-Computer and …, 2022 - Elsevier
The security of data is a major concern in this digital era. In general text and image data are
well protected with the help of existing standards, meanwhile, securing voice …

Design and implementation of a secured SDN system based on hybrid encrypted algorithms

S Ghaly, MZ Abdullah - … Computing Electronics and Control), 2021 - telkomnika.uad.ac.id
Software defined network suggests centralizing network knowledge in one network portion
by separating the routing (control plane) mechanism from the transmission network packet …

[PDF][PDF] 基于高级加密标准算法的基于128 位的高质量图像安全实现

AA Al-Hilali, LF Jumma, IA Amory - 西南交通大学学报, 2019 - researchgate.net
摘要如今, 信息安全在通过网络和存储进行数据传输中变得越来越重要, 因此每个人都知道数据
加密对于维护跨不同网络传输的信息的机密性和隐私性的重要性. 图像加密在避免窃听或破解对 …

A Robust MAES Encryption And Decryption Algorithm using Ankaru Model Through Fog Computing

S Karunya, BVJ Sara, K Angayarkkani… - 2024 International …, 2024 - ieeexplore.ieee.org
The world as a whole now depends on the data that people have stored online and how
these developments are tracked in the future. To satisfy the requirements of safeguarding …

Perbandingan kinerja algoritma RSA dan AES dalam enkripsi dan dekripsi citra digital

RMS Karim - 2024 - etheses.uin-malang.ac.id
6. Hisyam Fahmi, M. Kom, selaku ketua penguji yang telah memberikan arahan dan saran
yang membangun kepada penulis. 7. Mohammad Nafie Jauhari, M. Si, selaku dosen …

A Sheltered CARMA Algorithm Using Cosseted Articulate For Implication Data

RC Kalaiselvi, SM Vennila - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
In this current scenario, the entire world depends upon the data which they hold over the
internet and how these progressions towards the future is monitored. There is only one …

[PDF][PDF] SCHOOL OF POST GRADUATE STUDIES

D ABEBE - 2014 - lawethiopia.com
Trends in Africa show that ethnicity has been manipulated by rulers for political appointment,
economic control, social supremacy and cultural domination. Previous studies on the …

[引用][C] High-Quality Image Security Implementation Using 128-Bit Based on Advanced Encryption Standard algorithm

AA Al-Hilali, LF Jumma, IA Amory - Journal of Southwest Jiaotong University, 2019