• Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Communications
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Letter to the Editor
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • critical-appraisal
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • in-memomoriam
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • non-scientific
  • Obituary
  • original-paper
  • original-report
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • review-paper
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • serologic-method-review
  • short-communication
  • short-report
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • In Jour Smart Sensing And Intelligent Systems
  • International Journal Advanced Network Monitoring Controls


Article | 30-November-2018

Application of the Source Encryption Algorithm Model in the Power Industry

construction. This paper will focus on the introduction of a source encryption algorithm model, hoping to provide a digital security model reference for the application of digital business in the power industry. II. INTRODUCTION TO ENCRYPTION TECHNOLOGY As an important part of network security, data encryption technology plays a very important role in the network. It involves the confidentiality, authentication, non-repudiation and integrity of data. Key is the key of data encryption, which controls the

Jiao Longbing

International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 68–73

Article | 01-December-2016


Wireless Sensor Networks (WSN) is often deployed in hostile environments, and the attacker can easily capture nodes to inject false data to the sensor network, which can cause serious results. This paper has studied various false data filtering techniques recently in wireless sensor network. Based on encryption technology, we have analyzed and compared the difference of various existing filtering strategies, then have pointed out the merits and demerits of them in detailed. At last, we give the

Ze LUO, Lingzhi ZHU, Yunjie CHANG, Qingyun LUO, Guixiang LI, Weisheng LIAO

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 4, 1795–1821

Article | 01-December-2014


Digital image scrambling is to transform a digital image, to make it unrecognizable and become another chaos images without obvious meaning. If the operator knows the algorithms, he can reconstruct the original image from the chaos image by using the certain algorithms. Image scrambling encryption technology that based on Chaos Theory encrypts the image data stream through using the chaotic signal. It has the advantage like high security, encryption speed, large key space, and good scrambling

Wenqing Chen, Tao Wang, Bailing Wang

International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 4, 1453–1469

No Record Found..
Page Actions