2021 International Conference on Information Technology (ICIT) 2021
DOI: 10.1109/icit52682.2021.9491769
|View full text |Cite
|
Sign up to set email alerts
|

Light Fidelity to Transfer Secure Data Using Advanced Encryption Standard Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Eventually, after embedding, the order of fractional parts of a data item is randomly scrambled as expressed in Eq. (12). The function of the RanScram(x) that the order of bit string x is randomly changed.…”
Section: Ranscraminv(x)mentioning
confidence: 99%
See 1 more Smart Citation
“…Eventually, after embedding, the order of fractional parts of a data item is randomly scrambled as expressed in Eq. (12). The function of the RanScram(x) that the order of bit string x is randomly changed.…”
Section: Ranscraminv(x)mentioning
confidence: 99%
“…This scheme's principal goal is to ensure that each sensor data is aggregated within the WSN in a secure fashion, while fully preserving its privacy and integrity. Different from the traditional encryption fusion mechanism [10][11][12][13], the privacy scheme of wireless sensor network integrity verification based on homomorphic encryption has been studied. These protocols implement end-to-end security checks to ensure that data is not perceived during transmission.…”
Section: Introductionmentioning
confidence: 99%