2019 International Conference on Engineering and Telecommunication (EnT) 2019
DOI: 10.1109/ent47717.2019.9030541
|View full text |Cite
|
Sign up to set email alerts
|

An Architecture Model for Active Cyber Attacks on Intelligence Info-communication Systems:Application Based on Advance System Encryption (AES-512) Using Pre-Encrypted Search Table and Pseudo-Random Functions(PRFs)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…Furthermore, the work highlights that the de-veloped method can be extended to open environments such as wide area networks and neighbourhood area networks. In [112], researchers have designed an Advanced Encryption Standard-512 bit algorithm for faster processing speed with a stable surface environment in web-based applications with more secure communication.…”
Section: ) Cyber-security For Communication Channel Attacksmentioning
confidence: 99%
“…Furthermore, the work highlights that the de-veloped method can be extended to open environments such as wide area networks and neighbourhood area networks. In [112], researchers have designed an Advanced Encryption Standard-512 bit algorithm for faster processing speed with a stable surface environment in web-based applications with more secure communication.…”
Section: ) Cyber-security For Communication Channel Attacksmentioning
confidence: 99%