Search Result "cryptography"


Research Article

Extended XOR Algorithm with Biotechnology Constraints for Data Security in DNA Storage

Journal: Current Bioinformatics
Volume: 17 Issue: 5 Year: 2022 Page: 401-410
Author(s):

Spreadsheet Conditional Formatting Illuminates Investigations into Modular Arithmetic

Ebook: Young People’s Visions of the World

Volume: 1 Year: 2010
Author(s): David Miller,Stephen Sugden
Doi: 10.2174/97816080527691110101
Research Article

Energy Enhancement Techniques for Structure-Free Wireless Sensor Network with Encrypted Data

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 10 Issue: 3 Year: 2020 Page: 402-412
Author(s): Hussain K. Chaiel,Zainab S.M. Al-Husseini,Khaldun I. Arif

Enhancement of Iot Security Solutions Using Blockchain Technology

Ebook: Turbulent Flow and Boundary Layer Theory: Selected Topics and Solved Problems

Volume: 1 Year: 2021
Author(s): K. Sheela,C. Priya
Doi: 10.2174/97816810886241210101
Research Article

VLSI Implementation and Software Co-Simulation of Digital Image Watermarking with Increased Security

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 10 Issue: 4 Year: 2020 Page: 634-638
Author(s): Vardhana M.,Anil Kumar Bhat

A Review on Implementation of Cloud Security in the Aadhar Card Project

Ebook: Global Emerging Innovation Summit (GEIS-2021)

Volume: 1 Year: 2021
Author(s): Yogesh Kumar,Megha Malhotra
Doi: 10.2174/97816810890101210101
Research Article

A Hybrid Security System Based on Bit Rotation and Chaotic Maps

Journal: Current Signal Transduction Therapy
Volume: 14 Issue: 2 Year: 2019 Page: 152-157
Author(s): Majdi Al-qdah

Research Article

A Novel Simplified AES Algorithm for Lightweight Real-Time Applications: Testing and Discussion

Journal: Recent Advances in Computer Science and Communications
Volume: 13 Issue: 3 Year: 2020 Page: 435-445
Author(s): Malik Qasaimeh,Raad S. Al-Qassas,Fida Moh`d,Shadi Aljawarneh

Research Article

A Cost-effective Modelling of Faster Authentication Mechanism in Vertical Handover for an Effective Latency Control

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 9 Issue: 2 Year: 2019 Page: 278-286
Author(s): S.B Kumbalavati,J.D. Mallapur

Research Article

Design of Reversible Shift Register Using Reduced Number of Logic Gates

Journal: Micro and Nanosystems
Volume: 12 Issue: 1 Year: 2020 Page: 33-37
Author(s): Heranmoy Maity,Sudipta Banerjee,Arindam Biswas,Anita Pal,Anup Kumar Bhattacharjee

Previous   Next

Go To   Results 11 - 20 of 109

Filter Result

Volume Year
Content Type
Ads
© 2024 Bentham Science Publishers | Privacy Policy