Comparing the mean encryption memory usage for Salsa20, Chacha20, ERSA, NCS, and EHS (MB).</p
<p>Comparisons on the overall average capacity when disk size of collaborating nodes is varied.</p
<p>Comparison of encryption time between our proposed method and some other cryptosystems.</p
Comparison of recall rates of multi-category results for different intrusion detection models.</p
Comparing the mean decryption memory usage for Salsa20, Chacha20, ERSA, NCS, and EHS (MB).</p
Comparing the mean encryption throughput (KB/ms) for Salsa20, Chacha20, ERSA, NCS, and EHS.</p
Comparing the mean encryption time for Salsa20, Chacha20, ERSA, NCS, and EHS.</p
Comparing the mean decryption throughput (KB/ms) for Salsa20, Chacha20, ERSA, NCS, and EHS.</p
Comparing the mean and standard deviation decryption time for Salsa20, Chacha20, ERSA, NCS, and EHS....
Friedman test of the encryption times for Chacha20, Salsa20, ERSA, NCS and EHS.</p
Friedman test of the decryption times for Chacha20, Salsa20, ERSA, NCS and EHS.</p
<p>The figure shows the memory usage of the tested algorithms when processing databases with an aver...
<p>Comparison of mean CPU time on the Extended Yale B database with different corruption levels.</p
<p>The figure shows the memory usage obtained when processing databases with a number of sequences v...
Data security is becoming more important as data driven activities rose to cloud computing and big d...
<p>Comparison between the performance and security of the proposed and some typical block and chaos-...
<p>Comparisons on the overall average capacity when disk size of collaborating nodes is varied.</p
<p>Comparison of encryption time between our proposed method and some other cryptosystems.</p
Comparison of recall rates of multi-category results for different intrusion detection models.</p
Comparing the mean decryption memory usage for Salsa20, Chacha20, ERSA, NCS, and EHS (MB).</p
Comparing the mean encryption throughput (KB/ms) for Salsa20, Chacha20, ERSA, NCS, and EHS.</p
Comparing the mean encryption time for Salsa20, Chacha20, ERSA, NCS, and EHS.</p
Comparing the mean decryption throughput (KB/ms) for Salsa20, Chacha20, ERSA, NCS, and EHS.</p
Comparing the mean and standard deviation decryption time for Salsa20, Chacha20, ERSA, NCS, and EHS....
Friedman test of the encryption times for Chacha20, Salsa20, ERSA, NCS and EHS.</p
Friedman test of the decryption times for Chacha20, Salsa20, ERSA, NCS and EHS.</p
<p>The figure shows the memory usage of the tested algorithms when processing databases with an aver...
<p>Comparison of mean CPU time on the Extended Yale B database with different corruption levels.</p
<p>The figure shows the memory usage obtained when processing databases with a number of sequences v...
Data security is becoming more important as data driven activities rose to cloud computing and big d...
<p>Comparison between the performance and security of the proposed and some typical block and chaos-...
<p>Comparisons on the overall average capacity when disk size of collaborating nodes is varied.</p
<p>Comparison of encryption time between our proposed method and some other cryptosystems.</p
Comparison of recall rates of multi-category results for different intrusion detection models.</p