Zobrazeno 1 - 10
of 26
pro vyhledávání: '"A. H Azni"'
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Publikováno v:
IEEE Access, Vol 8, Pp 198646-198658 (2020)
The Internet of Things (IoT) is a broad range of applications enabled by the connection of devices such as sensors, actuators, and monitors accessible through the Internet. Massive IoT device connectivity and vast data transmission have made the info
Externí odkaz:
https://doaj.org/article/5a4129c234a24582815f4718d52d6194
Publikováno v:
IEEE Access, Vol 7, Pp 129291-129306 (2019)
Audio steganography allows and inspires many researchers to design methods for secure communication. Based on the evaluation on the existing methods, it was found that most methods focused on one or two requirements while disregarding others, causing
Externí odkaz:
https://doaj.org/article/0892cb92a6a94dd8915957e383a68168
Publikováno v:
2022 International Conference on Innovations in Science, Engineering and Technology (ICISET).
Publikováno v:
Communications in Computer and Information Science ISBN: 9789813368347
ACeS
ACeS
Key schedule algorithm is one of the core elements that significantly affect the security of an encryption algorithm. While its importance is undeniable, the key schedule algorithm has not been given comprehensive attention compared to the encryption
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::50b86dfdacf39b5da48e2084ebd49097
https://doi.org/10.1007/978-981-33-6835-4_13
https://doi.org/10.1007/978-981-33-6835-4_13
Autor:
Noor Shahidah, A. H. Azni
Publikováno v:
Journal of Communications. :430-435
Publikováno v:
Advanced Science Letters. 23:4692-4695
Publikováno v:
Advanced Science Letters. 23:4896-4900
Publikováno v:
Proceedings of the 2019 Asia Pacific Information Technology Conference.
A new integration of wireless communication technologies into the mobile heath system also known as mHealth has instigated a momentous research interest in the field of mobile security. mHealth systems are unique in terms of characteristics, challeng
Publikováno v:
Proceedings of the 2019 Asia Pacific Information Technology Conference.
The use of information communication technologies (ICTs) in therapy offers new perspectives for treating many domains in individuals with autism spectrum disorders (ASD) because it is used in many different ways and settings and they are attractive t
Publikováno v:
Computer Science Review. 38:100316
Audio steganography is the process of hiding a message inside an audio container. This study aims to present a systematic review of audio steganography methods. Existing reviews of audio steganography suffer from a high overlap or a low segregation l