2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2017
DOI: 10.23919/icitst.2017.8356339
|View full text |Cite
|
Sign up to set email alerts
|

RARE: A robust algorithm for rapid encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Hardware-based approach was also seen to be adopted for improving the image security over IoT. Research in this direction has been carried out by Boutros et al [39] and Omrani et al [40] where the chaos theory was found to improvise image encryption. Most recently, an integrated encryption technique has been presented by Elhoseny et al [41], where different forms of transformation technique has been used for encrypting medical images.…”
Section: Image Security Schemes In Iotmentioning
confidence: 99%
“…Hardware-based approach was also seen to be adopted for improving the image security over IoT. Research in this direction has been carried out by Boutros et al [39] and Omrani et al [40] where the chaos theory was found to improvise image encryption. Most recently, an integrated encryption technique has been presented by Elhoseny et al [41], where different forms of transformation technique has been used for encrypting medical images.…”
Section: Image Security Schemes In Iotmentioning
confidence: 99%