News

Abstract: In this paper, a novel 3D image file encryption algorithm based on a new discrete chaotic system ... The hash value which is calculated from the SHA-256 hash function is used to change the ...
neuron-like learning algorithm can realize a kind of memorable diffusion algorithm, thus realizing the plaintext-related image encryption algorithm. Through the feedback operation, the inputs and ...
IT white papers, webcasts, case studies, and much more - all free to registered TechRepublic members. With the increasing deployment of Industrial IoT in manufacturing and industrial operations ...
An IEEE standard for local and metropolitan area networks–Port-Based Network Access Control. IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission ...
This textbook focuses on distributed ledger technology (DLT) and its potential impact on society at large. It aims to offer a detailed and self-contained introduction to the founding principles behind ...