|
|
|
Dani Elias Mfungo, Xianping Fu, Xingyuan Wang and Yongjin Xian
In today?s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines the Kronecker xor pr...
ver más
|
|
|
|
|
|
|
Mohsin Murad, Imran A. Tasadduq and Pablo Otero
We propose an effective, low complexity and multifaceted scheme for peak-to-average power ratio (PAPR) reduction in the orthogonal frequency division multiplexing (OFDM) system for underwater acoustic (UWA) channels. In UWA OFDM systems, PAPR reduction i...
ver más
|
|
|
|
|
|
|
Kiernan George and Alan J. Michaels
This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique was concluded as a quality stream ...
ver más
|
|
|
|
|
|
|
Syed Hamid Hasan, Mohamed Salim Trigui, Anser Ghazzaal Ali Alquraishee
Pág. 1424 - 1429
The process of protecting the accessibility, reliability, and secrecy of information is called Information security. We see a great increase in accessing of computer databases for stored information. Increasing number of companies are storing indiv...
ver más
|
|
|
|
|
|
|
Eka Yulia Sari,Ahmad Rifki Harir,Dony Ariyus
Saat ini Indonesia memasuki industri 4.0, dimana apapun berhubungan dengan teknologi. Pertukaran data dan informasi secara digital lebih efektif dan efisien sehingga memudahkan penggunanya. Tentunya data dan informasi ada yang dapat diakses publik dan ad...
ver más
|
|
|
|