Suchergebnisse - Engineering::Computer science and engineering::Data::Data encryption

  1. 1

    Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain von Xu, Ze, Cao, Sanxing

    ISSN: 1526-1506, 1526-1492, 1526-1506
    Veröffentlicht: Henderson Tech Science Press 2023
    “… ) the inability to solve the problem of the high computational complexity of ciphertext in multi-source data privacy protection, resulting in long encryption and decryption …”
    Volltext
    Journal Article
  2. 2

    IDCE: Integrated Data Compression and Encryption for Enhanced Security and Efficiency von Usama, Muhammad, Aziz, Arshad, Alsuhibany, Suliman A., Hassan, Imtiaz, Yuldashev, Farrukh

    ISSN: 1526-1506, 1526-1492, 1526-1506
    Veröffentlicht: Henderson Tech Science Press 2025
    “… With the exponential growth of digital data, robust security measures are essential. Data encryption, a widely used approach, ensures data confidentiality by making it unreadable and unalterable through secret key control …”
    Volltext
    Journal Article
  3. 3

    Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications von Chen, Li-Woei, Tsai, Kun-Lin, Leu, Fang-Yie, Jiang, Wen-Cheng, Tseng, Shih-Ting

    ISSN: 1526-1506, 1526-1492, 1526-1506
    Veröffentlicht: Henderson Tech Science Press 2024
    “… ; however, it increases energy consumption and reduces data processing speed. Therefore, this study proposes a low-energy data encryption (LEDE …”
    Volltext
    Journal Article
  4. 4

    High-dimensional memristive neural network and its application in commercial data encryption communication von Wang, Chunhua, Tang, Dong, Lin, Hairong, Yu, Fei, Sun, Yichuang

    ISSN: 0957-4174, 1873-6793
    Veröffentlicht: Elsevier Ltd 15.05.2024
    Veröffentlicht in Expert systems with applications (15.05.2024)
    “… With the development of economic globalization, demands for digital business data sharing among different subsidiary companies are constantly emerging …”
    Volltext
    Journal Article
  5. 5

    Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT von Jia, Bin, Zhang, Xiaosong, Liu, Jiewen, Zhang, Yang, Huang, Ke, Liang, Yongquan

    ISSN: 1551-3203, 1941-0050
    Veröffentlicht: Piscataway IEEE 01.06.2022
    Veröffentlicht in IEEE transactions on industrial informatics (01.06.2022)
    “… With rapid growth in data volume generated from different industrial devices in IoT, the protection for sensitive and private data in data sharing has become crucial …”
    Volltext
    Journal Article
  6. 6

    Revocable Attribute-Based Encryption With Data Integrity in Clouds von Ge, Chunpeng, Susilo, Willy, Baek, Joonsang, Liu, Zhe, Xia, Jinyue, Fang, Liming

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: Washington IEEE 01.09.2022
    “… Attribute-based encryption has become a promising solution for encrypted data access control in clouds due to the ability to achieve one-to-many encrypted data sharing …”
    Volltext
    Journal Article
  7. 7

    Impulsive Synchronization of Unbounded Delayed Inertial Neural Networks With Actuator Saturation and Sampled-Data Control and its Application to Image Encryption von Li, Hongfei, Li, Chuandong, Ouyang, Deqiang, Nguang, Sing Kiong

    ISSN: 2162-237X, 2162-2388, 2162-2388
    Veröffentlicht: United States IEEE 01.04.2021
    “… The article considers the impulsive synchronization for inertial neural networks with unbounded delay and actuator saturation via sampled-data control …”
    Volltext
    Journal Article
  8. 8

    A resource-efficient encryption algorithm for multimedia big data von Aljawarneh, Shadi, Yassein, Muneer Bani, Talafha, We’am Adel

    ISSN: 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.11.2017
    Veröffentlicht in Multimedia tools and applications (01.11.2017)
    “… Currently symmetric encryption algorithms are used in IoT but when considering multimedia big data in IoT, symmetric encryption algorithms incur more computational cost …”
    Volltext
    Journal Article
  9. 9

    Searchable Encryption over Feature-Rich Data von Wang, Qian, He, Meiqi, Du, Minxin, Chow, Sherman S. M., Lai, Russell W. F., Zou, Qin

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: Washington IEEE 01.05.2018
    “… Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in encrypted form …”
    Volltext
    Journal Article
  10. 10

    A Comprehensive Review on Image Encryption Techniques von Kaur, Manjit, Kumar, Vijay

    ISSN: 1134-3060, 1886-1784
    Veröffentlicht: Dordrecht Springer Netherlands 01.01.2020
    Veröffentlicht in Archives of computational methods in engineering (01.01.2020)
    “… Image encryption techniques play a significant role in multimedia applications to secure and authenticate digital images …”
    Volltext
    Journal Article
  11. 11

    No more privacy Concern: A privacy-chain based homomorphic encryption scheme and statistical method for privacy preservation of user’s private and sensitive data von Sathish Kumar, G., Premalatha, K., Uma Maheshwari, G., Rajesh Kanna, P.

    ISSN: 0957-4174, 1873-6793
    Veröffentlicht: Elsevier Ltd 30.12.2023
    Veröffentlicht in Expert systems with applications (30.12.2023)
    “… Internet giants collects a huge volume of data using the modern technologies and apply them to data mining for prediction and decision making in numerous fields, for instance, health care, web …”
    Volltext
    Journal Article
  12. 12

    Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications von Thakur, Sriti, Singh, Amit Kumar, Ghrera, Satya Prakash, Elhoseny, Mohamed

    ISSN: 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.02.2019
    Veröffentlicht in Multimedia tools and applications (01.02.2019)
    “… For better confidentiality, we apply the chaos based encryption algorithm on watermarked image in a less complex manner …”
    Volltext
    Journal Article
  13. 13

    Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds von Ge, Chunpeng, Liu, Zhe, Xia, Jinyue, Fang, Liming

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: Washington IEEE 01.05.2021
    “… Ensuring a secure data sharing is critical to cloud applications. Recently, a number of identity-based broadcast proxy re-encryption (IB-BPRE …”
    Volltext
    Journal Article
  14. 14

    A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds von Ge, Chunpeng, Susilo, Willy, Baek, Joonsang, Liu, Zhe, Xia, Jinyue, Fang, Liming

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: Washington IEEE 01.09.2022
    “… To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-encryption (ABPRE …”
    Volltext
    Journal Article
  15. 15

    A color image encryption technique using block scrambling and chaos von Hosny, Khalid M., Kamal, Sara T., Darwish, Mohamed M.

    ISSN: 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.01.2022
    Veröffentlicht in Multimedia tools and applications (01.01.2022)
    “… Images are very important forms of data that are widely used nowadays. Every day, millions of grey and color images are transferred via the web …”
    Volltext
    Journal Article
  16. 16

    Searchable Symmetric Encryption with Forward Search Privacy von Li, Jin, Huang, Yanyu, Wei, Yu, Lv, Siyi, Liu, Zheli, Dong, Changyu, Lou, Wenjing

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: Washington IEEE 01.01.2021
    “… Searchable symmetric encryption (SSE) has been widely applied in the encrypted database for queries in practice …”
    Volltext
    Journal Article
  17. 17

    Image encryption based on a combination of multiple chaotic maps von Elkandoz, Marwa Tarek, Alexan, Wassim

    ISSN: 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.07.2022
    Veröffentlicht in Multimedia tools and applications (01.07.2022)
    “… This creates a major challenge for researchers to come up with efficient and effective image encryption schemes …”
    Volltext
    Journal Article
  18. 18

    Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption von Ma, Kede, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, Fenghua Li

    ISSN: 1556-6013, 1556-6021
    Veröffentlicht: New York, NY IEEE 01.03.2013
    “… In this paper, we propose a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image …”
    Volltext
    Journal Article
  19. 19

    Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption von Liu, Hongjun, Liu, Jian, Ma, Chao

    ISSN: 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.07.2023
    Veröffentlicht in Multimedia tools and applications (01.07.2023)
    “… To verify its effectiveness in cryptography, the red, green and blue components of color image are encrypted using three S-Boxes, to further enhance the encryption intensity, three random …”
    Volltext
    Journal Article
  20. 20

    Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity von Chen, Shaobo, Li, Jiguo, Zhang, Yichen, Han, Jinguang

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: Piscataway IEEE 15.03.2024
    Veröffentlicht in IEEE internet of things journal (15.03.2024)
    “… To address the above issues, we propose a revocable attribute-based encryption scheme that protects the data integrity (RABE-DI …”
    Volltext
    Journal Article