25
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Optimization of data packet encryption algorithm in network link transport layer

ORCID Icon
Pages 53-70 | Received 29 Dec 2022, Accepted 31 Jul 2023, Published online: 10 Aug 2023

References

  • Padmaa M, Jayasankar T, Venkatraman S, et al. Oppositional chaos game optimization based clustering with trust based data transmission protocol for intelligent IoT edge systems. J Parallel Distrib Comput. 2022;164:142–151. doi: 10.1016/j.jpdc.2022.03.008
  • Envelope J. Computer network security technology and prevention strategy analysis. Procedia Comput Sci. 2022;208:570–576. doi: 10.1016/j.procs.2022.10.079
  • Liu M, Yu W, Wang J, et al. Design of 9-D global chaotic system and its application in secure communication.Circuit world. Circuit World. 2022;48(1):88–104. doi: 10.1108/CW-03-2020-0042
  • Chen J, Zhu Z, Zhang L, et al. Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption. Signal Process. 2018;142:340–353. DOI:10.1016/j.sigpro.2017.07.034
  • Chai X, Fu J, Gan Z, et al. An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dyn. 2022;108(3):2671–2704. doi: 10.1007/s11071-022-07328-3
  • Kaur A, Singh G. RSS blowfish block encryption technique for secure image cryptography. IJARCCE. 2018;7(9):59–65. doi: 10.17148/IJARCCE.2018.7911
  • Xu W, Xiang S, Sachnev V. A cryptograph domain image retrieval method based on paillier homomorphic block encryption. Comput Mater Continua. 2018;55(2):285–295.
  • Lou X, Tang W, Long H, et al. A quantum blind signature scheme based on block encryption and quantum Fourier transfer. Int J Theor Phys. 2019;58(10):3192–3202. doi: 10.1007/s10773-019-04195-4
  • Yi L, Tong X, Wang Z, et al. A novel block encryption algorithm based on chaotic S-Box for wireless sensor network. IEEE Access. 2019;7:53079–53090. doi: 10.1109/ACCESS.2019.2911395
  • Ziar RA, Irfanullah S, Khan WU, et al. Privacy preservation for on-chain data in the permission less blockchain using symmetric key encryption and smart contract. Mehran Univ Res J Eng. 2021;40(2):305–313. doi: 10.22581/muet1982.2102.05
  • Niu S, Chen L, Wang J, et al. Electronic health record sharing scheme with searchable attribute-based encryption on blockchain. IEEE Access. 2020;8:7195–7204. DOI:10.1109/ACCESS.2019.2959044
  • Xiang S, Wang B, Wang Y, et al. 2. 24-Tb/s physical random bit generation with minimal post-processing based on chaotic semiconductor lasers network. J Lightwave Technol. 2019;37(99):3987–3993. doi: 10.1109/JLT.2019.2920476
  • Yeoh WZ, Teh JS, Chern HR. A parallelizable chaos-based true random number generator based on mobile device cameras for the android platform. Multimedia Tools Appl. 2019;78(12):15929–15949. doi: 10.1007/s11042-018-7015-0
  • Alcin M, Koyuncu I, Tuna M, et al. A novel high speed Artificial Neural Network-based chaotic True Random Number Generator on Field Programmable Gate Array. Int J CIRCUIT THEORY Appl. 2019;47(3):365–378. doi: 10.1002/cta.2581
  • Bi J, Yin S, Li H, et al. Research on Medical image encryption method based on improved krill herb algorithm and chaotic systems. Int J Netw Secur. 2020;22(3):486–491.
  • Envelope VS, Thangavel P. An exalted three-dimensional image encryption model availing a novel twin attractor chaotic system. Procedia Comput Sci. 2022;204:728–735. doi: 10.1016/j.procs.2022.08.088
  • Anh H, Cao VK. Robust extreme learning machine neural approach for uncertain nonlinear hyper‐chaotic system identification. Int J Robust Nonlinear Control. 2021;31(18):9127–9148. doi: 10.1002/rnc.5756
  • Bisoyi A, Tripathy A. Design of a novel fused add-sub module for IEEE 754-2008 floating point unit in high-speed applications. Comm Appl Electron. 2020;7(33):1–7. doi: 10.5120/cae2020652854
  • Jolivet M, Dauteuil O, Gaudare L. Blowing the rivers:regional-scale control of the drainage network by wind in northern Kalahari (Africa). Geomorphology. 2022;398(Feb.1):.108039.1–.108039.18. doi: 10.1016/j.geomorph.2021.108039
  • Cao J, Liu Y, Li C. Damage cross detection between bridges monitored within one cluster using the difference ratio of projected strain monitoring data:. Struct Health Monit. 2022;21(2):571–595. doi: 10.1177/14759217211006792

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.