Zobrazeno 1 - 10
of 898
pro vyhledávání: '"avalanche effect"'
Publikováno v:
IEEE Access, Vol 12, Pp 22813-22820 (2024)
In this study, we proposed a novel design for fabricating a unitraveling carrier–type photodetector using In0.52Al0.48As as the collector material. The proposed InAlAs photodetector is based on the structure of a conventional unitraveling carrier
Externí odkaz:
https://doaj.org/article/e85dfa1e0ed44028a69126f6f89cdeb8
Autor:
Riley Vaughn, Mike Borowczak
Publikováno v:
Cryptography, Vol 8, Iss 3, p 40 (2024)
The measure of diffusion, the property of dissipating patterns and statistical structures in cryptographic transformations, serves as a valuable heuristic for assessing the obscurity of patterns that could lead to collisions. As with many cryptograph
Externí odkaz:
https://doaj.org/article/48e713d735a44caeaedf1a8247df822d
Autor:
Wang Jian
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
In this paper, we first study cloud computing technology and build a computer network security defense system based on cloud computing technology. Secondly, to better analyze the network generated by cloud computing, the corresponding network topolog
Externí odkaz:
https://doaj.org/article/35ffcf8915ca45638e33e2e6c9e7691e
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-12 (2023)
Abstract Globally, data maintenance and its security are vital tasks due to the rapid development of advanced technologies. Users now utilise Cloud computing technique and security techniques to preserve their data securely from intruders and hackers
Externí odkaz:
https://doaj.org/article/f6ac064d7fba45129a78718dd7a2e8fa
Publikováno v:
Open Engineering, Vol 12, Iss 1, Pp 570-577 (2022)
This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys. The main characteristics of this lightweight algo
Externí odkaz:
https://doaj.org/article/50438fbe65584b699f9aa66c93cc432d
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Egyptian Informatics Journal, Vol 23, Iss 2, Pp 291-301 (2022)
The recent innovations in network application and the internet have made data and network security the major role in data communication system development. Cryptography is one of the outstanding and powerful tools for ensuring data and network securi
Externí odkaz:
https://doaj.org/article/46f5b19f085242988801bd43cf1bc1a0
Publikováno v:
IEEE Access, Vol 10, Pp 112472-112486 (2022)
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of the data, in forensic investigati
Externí odkaz:
https://doaj.org/article/7f45e19a15f14e7290f33e7035b7d6ec
Publikováno v:
Journal of ICT Research and Applications, Vol 16, Iss 3 (2022)
In this work, three sub-processes are serially integrated into just one process in order to construct a robust new image encryption scheme for all types of images, especially color images. This integration architecture aims to create a robust avalanc
Externí odkaz:
https://doaj.org/article/ea1d9ff1c9fa4ab1b97734f90239edaa