Zobrazeno 1 - 10
of 272
pro vyhledávání: '"AES encryption"'
Autor:
Wei Li, Qian Huang
Publikováno v:
Egyptian Informatics Journal, Vol 28, Iss , Pp 100569- (2024)
Aiming at the hidden danger of information security caused by the lack of medical big data information security firewall, this paper proposes a security privacy protection method for hospital big data based on hybrid encryption algorithm. First, coll
Externí odkaz:
https://doaj.org/article/caf61f8898024797981ad880b93c0ae9
Autor:
Chenzhe Mu
Publikováno v:
Frontiers in Mechanical Engineering, Vol 10 (2024)
Introduction: As the main means of information exchange within vehicles, the safety of the controller area network bus directly affects the safe operation of the vehicle and the safety of passengers’ lives and property.Methods: To enhance its secur
Externí odkaz:
https://doaj.org/article/d4c0d6ed65ee481baca7bf6cf793a2a1
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 3, Iss 4, Pp 844-857 (2023)
Power-based Side-Channel Analysis (SCA) began with visual-based examinations and has progressed to utilize data-driven statistical analysis. Two distinct classifications of these methods have emerged over the years; those focused on leakage exploitat
Externí odkaz:
https://doaj.org/article/ebdb73dbfb654797ae07cc8f1dc710f5
Publikováno v:
ISPRS International Journal of Geo-Information, Vol 13, Iss 8, p 274 (2024)
The integration of a blockchain-supported serverless computing framework enhances the performance of computational and analytical operations and the provision of services within internet-based data centers, rather than depending on independent deskto
Externí odkaz:
https://doaj.org/article/b00922c1b3454942ad3cc62a2f1dd89c
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
In this paper, we use the event map as well as the even map reaction system, combined with the lightweight network data transmission encryption method of matrix tensor product, to establish the even map model for big data security management. The tra
Externí odkaz:
https://doaj.org/article/eefd279d85a4487287af30994a18cd66
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Guangtongxin yanjiu, Pp 7-11 (2022)
In view of insufficient security in the next generation passive optical network, an electro-optic hybrid encryption scheme based on MD5 message digest algorithm check is proposed in this paper. In the scheme, Baker scrambling algorithm and 256 bit Ad
Externí odkaz:
https://doaj.org/article/431b1921cd6448e4960a05b4a3b93cb5
Publikováno v:
Guangtongxin yanjiu, Iss 4, Pp 7-11 (2022)
In view of insufficient security in the next generation passive optical network, an electro-optic hybrid encryption scheme based on MD5 message digest algorithm check is proposed in this paper. In the scheme, Baker scrambling algorithm and 256 bit Ad
Externí odkaz:
https://doaj.org/article/31594237d64c426d8de298a23cfab9f6
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 10, Pp 10566-10574 (2022)
3D objects have come to play an essential role in industry. They can also be very large, sometimes containing millions of vertices, and therefore it is vital that they are compressed, particularly when it comes to uploading them to the web and during
Externí odkaz:
https://doaj.org/article/4e9f0ed05cf643ab951925312e4118c4