Efficient and secure multi-user multi-task computation offloading for mobile-edge computing in mobile IoT networks

IA Elgendy, WZ Zhang, Y Zeng, H He… - … on Network and …, 2020 - ieeexplore.ieee.org
Mobile edge computing (MEC) is a new paradigm to alleviate resource limitations of mobile
IoT networks through computation offloading with low latency. This article presents an …

[HTML][HTML] Medical image encryption: an application for improved padding based GGH encryption algorithm

M Sokouti, A Zakerolhosseini… - The open medical …, 2016 - ncbi.nlm.nih.gov
Medical images are regarded as important and sensitive data in the medical informatics
systems. For transferring medical images over an insecure network, developing a secure …

A novel medical image encryption using cyclic coding in Covid-19 pandemic situation

B Bose, D Dey, A Sengupta… - Journal of Physics …, 2021 - iopscience.iop.org
During this Covid-19 pandemic situation, encryption of medical images takes a major role in
medical information systems as well as in telemedicine. However according to government …

An improved genetic algorithm and a new discrete cuckoo algorithm for solving the classical substitution cipher

A Jain, NS Chaudhari - International Journal of Applied …, 2019 - igi-global.com
Searching secret key of classical ciphers in the keyspace is a challenging NP-complete
problem that can be successfully solved using metaheuristic techniques. This article …

[PDF][PDF] Applications of evolutionary computation to cryptology

S Picek - 2015 - repository.ubn.ru.nl
Untitled Page 1 Page 2 Page 3 Applications of Evolutionary Computation to Cryptology
Stjepan Picek Page 4 Copyright c Stjepan Picek, 2015 ISBN: 978-94-6295-238-6 IPA …

S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?

L Batina, D Jakobovic, N Mentens, S Picek… - … on Cryptology in India, 2014 - Springer
In the last few years, several practitioners have proposed a wide range of approaches for
reducing the implementation area of the AES in hardware. However, an area-throughput …

A comparison of one time pad random key generation using linear congruential generator and quadratic congruential generator

D Apdilah, MK Harahap, N Khairina… - Journal of Physics …, 2018 - iopscience.iop.org
Abstract One Time Pad algorithm always requires a pairing of the key for plaintext. If the
length of keys less than a length of the plaintext, the key will be repeated until the length of …

An improved genetic algorithm for developing deterministic OTP key generator

A Jain, NS Chaudhari - Complexity, 2017 - Wiley Online Library
Recently, a genetic‐based random key generator (GRKG) for the one‐time pad (OTP)
cryptosystem has been proposed in the literature which has certain limitations. In this paper …

A novel stream cipher using pesudo random binary sequence generator for medical image encryption

PV Saraswathi, M Venkatesulu - 2017 international conference …, 2017 - ieeexplore.ieee.org
In the field of medical information systems medical images are transmitted through
communication channels which are treated as more sensitive data and it is necessary to …

A novel cuckoo search technique for solving discrete optimization problems

A Jain, NS Chaudhari - … Journal of System Assurance Engineering and …, 2018 - Springer
During the past decade, swarm intelligence (SI) techniques have received considerable
recognition among researchers to solve continuous optimization problems. However, only …