Search Results - Engineering::Computer science and engineering::Data::Data encryption
-
1
Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain
ISSN: 1526-1506, 1526-1492, 1526-1506Published: Henderson Tech Science Press 2023Published in Computer modeling in engineering & sciences (2023)“…) the inability to solve the problem of the high computational complexity of ciphertext in multi-source data privacy protection, resulting in long encryption and decryption…”
Get full text
Journal Article -
2
IDCE: Integrated Data Compression and Encryption for Enhanced Security and Efficiency
ISSN: 1526-1506, 1526-1492, 1526-1506Published: Henderson Tech Science Press 2025Published in Computer modeling in engineering & sciences (2025)“… With the exponential growth of digital data, robust security measures are essential. Data encryption, a widely used approach, ensures data confidentiality by making it unreadable and unalterable through secret key control…”
Get full text
Journal Article -
3
Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications
ISSN: 1526-1506, 1526-1492, 1526-1506Published: Henderson Tech Science Press 2024Published in Computer modeling in engineering & sciences (2024)“…; however, it increases energy consumption and reduces data processing speed. Therefore, this study proposes a low-energy data encryption (LEDE…”
Get full text
Journal Article -
4
High-dimensional memristive neural network and its application in commercial data encryption communication
ISSN: 0957-4174, 1873-6793Published: Elsevier Ltd 15.05.2024Published in Expert systems with applications (15.05.2024)“…With the development of economic globalization, demands for digital business data sharing among different subsidiary companies are constantly emerging…”
Get full text
Journal Article -
5
Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT
ISSN: 1551-3203, 1941-0050Published: Piscataway IEEE 01.06.2022Published in IEEE transactions on industrial informatics (01.06.2022)“…With rapid growth in data volume generated from different industrial devices in IoT, the protection for sensitive and private data in data sharing has become crucial…”
Get full text
Journal Article -
6
Revocable Attribute-Based Encryption With Data Integrity in Clouds
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.09.2022Published in IEEE transactions on dependable and secure computing (01.09.2022)“… Attribute-based encryption has become a promising solution for encrypted data access control in clouds due to the ability to achieve one-to-many encrypted data sharing…”
Get full text
Journal Article -
7
Impulsive Synchronization of Unbounded Delayed Inertial Neural Networks With Actuator Saturation and Sampled-Data Control and its Application to Image Encryption
ISSN: 2162-237X, 2162-2388, 2162-2388Published: United States IEEE 01.04.2021Published in IEEE transaction on neural networks and learning systems (01.04.2021)“…The article considers the impulsive synchronization for inertial neural networks with unbounded delay and actuator saturation via sampled-data control…”
Get full text
Journal Article -
8
A resource-efficient encryption algorithm for multimedia big data
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.11.2017Published in Multimedia tools and applications (01.11.2017)“… Currently symmetric encryption algorithms are used in IoT but when considering multimedia big data in IoT, symmetric encryption algorithms incur more computational cost…”
Get full text
Journal Article -
9
Searchable Encryption over Feature-Rich Data
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.05.2018Published in IEEE transactions on dependable and secure computing (01.05.2018)“…Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in encrypted form…”
Get full text
Journal Article -
10
A Comprehensive Review on Image Encryption Techniques
ISSN: 1134-3060, 1886-1784Published: Dordrecht Springer Netherlands 01.01.2020Published in Archives of computational methods in engineering (01.01.2020)“…Image encryption techniques play a significant role in multimedia applications to secure and authenticate digital images…”
Get full text
Journal Article -
11
No more privacy Concern: A privacy-chain based homomorphic encryption scheme and statistical method for privacy preservation of user’s private and sensitive data
ISSN: 0957-4174, 1873-6793Published: Elsevier Ltd 30.12.2023Published in Expert systems with applications (30.12.2023)“…Internet giants collects a huge volume of data using the modern technologies and apply them to data mining for prediction and decision making in numerous fields, for instance, health care, web…”
Get full text
Journal Article -
12
Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.02.2019Published in Multimedia tools and applications (01.02.2019)“… For better confidentiality, we apply the chaos based encryption algorithm on watermarked image in a less complex manner…”
Get full text
Journal Article -
13
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.05.2021Published in IEEE transactions on dependable and secure computing (01.05.2021)“… Ensuring a secure data sharing is critical to cloud applications. Recently, a number of identity-based broadcast proxy re-encryption (IB-BPRE…”
Get full text
Journal Article -
14
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.09.2022Published in IEEE transactions on dependable and secure computing (01.09.2022)“…To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-encryption (ABPRE…”
Get full text
Journal Article -
15
A color image encryption technique using block scrambling and chaos
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.01.2022Published in Multimedia tools and applications (01.01.2022)“…Images are very important forms of data that are widely used nowadays. Every day, millions of grey and color images are transferred via the web…”
Get full text
Journal Article -
16
Searchable Symmetric Encryption with Forward Search Privacy
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.01.2021Published in IEEE transactions on dependable and secure computing (01.01.2021)“…Searchable symmetric encryption (SSE) has been widely applied in the encrypted database for queries in practice…”
Get full text
Journal Article -
17
Image encryption based on a combination of multiple chaotic maps
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.07.2022Published in Multimedia tools and applications (01.07.2022)“… This creates a major challenge for researchers to come up with efficient and effective image encryption schemes…”
Get full text
Journal Article -
18
Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.07.2023Published in Multimedia tools and applications (01.07.2023)“… To verify its effectiveness in cryptography, the red, green and blue components of color image are encrypted using three S-Boxes, to further enhance the encryption intensity, three random…”
Get full text
Journal Article -
19
Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 15.03.2024Published in IEEE internet of things journal (15.03.2024)“… To address the above issues, we propose a revocable attribute-based encryption scheme that protects the data integrity (RABE-DI…”
Get full text
Journal Article -
20
Survey on Image Encryption Schemes, Bio cryptography and Efficient Encryption Algorithms
ISSN: 1383-469X, 1572-8153Published: New York Springer US 01.08.2023Published in Mobile networks and applications (01.08.2023)“…Cryptography protects the data stored in the network from unauthorized access. It is very essential to transfer data with high security…”
Get full text
Journal Article