[HTML][HTML] Cryptographic data security for reliable wireless sensor network

S Urooj, S Lata, S Ahmad, S Mehfuz… - Alexandria Engineering …, 2023 - Elsevier
Abstract Wireless Sensor Networks (WSNs) are widely utilized in a variety of applications.
Attackers might interfere with equipment, and eavesdrop on conversations. Attackers can …

[HTML][HTML] A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

ZE Dawahdeh, SN Yaakob, RR bin Othman - Journal of King Saud …, 2018 - Elsevier
Image encryption is rapidly increased recently by the increasing use of the internet and
communication media. Sharing important images over unsecured channels is liable for …

[PDF][PDF] A new hybrid text encryption approach over mobile ad hoc network

MA Almaiah, Z Dawahdeh, O Almomani… - Int. J. Electr. Comput …, 2020 - academia.edu
Data exchange has been rapidly increased recently by increasing the use of mobile
networks. Sharing information (text, image, audio and video) over unsecured mobile network …

A secure and efficient ECC-based scheme for edge computing and internet of things

H AlMajed, A AlMogren - Sensors, 2020 - mdpi.com
Recent growth in the Internet of Things (IoT) has raised security concerns over the
confidentiality of data exchanged between IoT devices and the edge. Many IoT systems …

SE-ENC: A secure and efficient encoding scheme using elliptic curve cryptography

HN Almajed, AS Almogren - IEEE Access, 2019 - ieeexplore.ieee.org
Many applications use asymmetric cryptography to secure communications between two
parties. One of the main issues with asymmetric cryptography is the need for vast amounts of …

Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes–Vanstone elliptic curve cryptosystem

Z Liu, T Xia, J Wang - Chinese Physics B, 2018 - iopscience.iop.org
We propose a new fractional two-dimensional triangle function combination discrete chaotic
map (2D-TFCDM) with the discrete fractional difference. Moreover, the chaos behaviors of …

[HTML][HTML] Security for wireless sensor networks using cryptography

P Ramadevi, S Ayyasamy, Y Suryaprakash… - Measurement …, 2023 - Elsevier
Abstract WSNs (Wireless Sensor Networks) are becoming more and more capable with
each passing day. Widespread usage of WSNs is helping mitigate many dangers. Protecting …

Hybrid cryptography for secure data communication in wireless sensor networks

S Prakash, A Rajput - Ambient Communications and Computer Systems …, 2018 - Springer
Nodes in the wireless sensor networks (WSN) have limited battery power and deployed to
run few days. In general, sensor nodes are placed at very complicated locations; therefore …

[HTML][HTML] An improved image encryption algorithm based on Bézier coefficients matrix

NHM Ismail, MY Misro - Journal of King Saud University-Computer and …, 2022 - Elsevier
In recent years, numerous images are engaged over various unprotected broad networks,
causing safety and privacy threats to users. This is where image encryption plays a role in …

[PDF][PDF] A NEW MODIFIED GRAYSCALE IMAGE ENCRYPTION TECHNIQUE USING ELLIPTIC CURVE CRYPTOSYSTEM

ZE DAWAHDEH, MA ALMAIAH, T ALKHDOUR… - Journal of Theoretical …, 2024 - jatit.org
Image encryption is one of the interested and important topics that recently spread as a
result of the growing usage of the internet and other forms of communication in order to …