Search Results - Engineering::Computer science and engineering::Data::Data encryption

Refine Results
  1. 1

    Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain by Xu, Ze, Cao, Sanxing

    ISSN: 1526-1506, 1526-1492, 1526-1506
    Published: Henderson Tech Science Press 2023
    “…) the inability to solve the problem of the high computational complexity of ciphertext in multi-source data privacy protection, resulting in long encryption and decryption…”
    Get full text
    Journal Article
  2. 2

    IDCE: Integrated Data Compression and Encryption for Enhanced Security and Efficiency by Usama, Muhammad, Aziz, Arshad, Alsuhibany, Suliman A., Hassan, Imtiaz, Yuldashev, Farrukh

    ISSN: 1526-1506, 1526-1492, 1526-1506
    Published: Henderson Tech Science Press 2025
    “… With the exponential growth of digital data, robust security measures are essential. Data encryption, a widely used approach, ensures data confidentiality by making it unreadable and unalterable through secret key control…”
    Get full text
    Journal Article
  3. 3

    Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications by Chen, Li-Woei, Tsai, Kun-Lin, Leu, Fang-Yie, Jiang, Wen-Cheng, Tseng, Shih-Ting

    ISSN: 1526-1506, 1526-1492, 1526-1506
    Published: Henderson Tech Science Press 2024
    “…; however, it increases energy consumption and reduces data processing speed. Therefore, this study proposes a low-energy data encryption (LEDE…”
    Get full text
    Journal Article
  4. 4

    High-dimensional memristive neural network and its application in commercial data encryption communication by Wang, Chunhua, Tang, Dong, Lin, Hairong, Yu, Fei, Sun, Yichuang

    ISSN: 0957-4174, 1873-6793
    Published: Elsevier Ltd 15.05.2024
    Published in Expert systems with applications (15.05.2024)
    “…With the development of economic globalization, demands for digital business data sharing among different subsidiary companies are constantly emerging…”
    Get full text
    Journal Article
  5. 5

    Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT by Jia, Bin, Zhang, Xiaosong, Liu, Jiewen, Zhang, Yang, Huang, Ke, Liang, Yongquan

    ISSN: 1551-3203, 1941-0050
    Published: Piscataway IEEE 01.06.2022
    “…With rapid growth in data volume generated from different industrial devices in IoT, the protection for sensitive and private data in data sharing has become crucial…”
    Get full text
    Journal Article
  6. 6

    Revocable Attribute-Based Encryption With Data Integrity in Clouds by Ge, Chunpeng, Susilo, Willy, Baek, Joonsang, Liu, Zhe, Xia, Jinyue, Fang, Liming

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.09.2022
    “… Attribute-based encryption has become a promising solution for encrypted data access control in clouds due to the ability to achieve one-to-many encrypted data sharing…”
    Get full text
    Journal Article
  7. 7

    Impulsive Synchronization of Unbounded Delayed Inertial Neural Networks With Actuator Saturation and Sampled-Data Control and its Application to Image Encryption by Li, Hongfei, Li, Chuandong, Ouyang, Deqiang, Nguang, Sing Kiong

    ISSN: 2162-237X, 2162-2388, 2162-2388
    Published: United States IEEE 01.04.2021
    “…The article considers the impulsive synchronization for inertial neural networks with unbounded delay and actuator saturation via sampled-data control…”
    Get full text
    Journal Article
  8. 8

    A resource-efficient encryption algorithm for multimedia big data by Aljawarneh, Shadi, Yassein, Muneer Bani, Talafha, We’am Adel

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.11.2017
    Published in Multimedia tools and applications (01.11.2017)
    “… Currently symmetric encryption algorithms are used in IoT but when considering multimedia big data in IoT, symmetric encryption algorithms incur more computational cost…”
    Get full text
    Journal Article
  9. 9

    Searchable Encryption over Feature-Rich Data by Wang, Qian, He, Meiqi, Du, Minxin, Chow, Sherman S. M., Lai, Russell W. F., Zou, Qin

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.05.2018
    “…Storage services allow data owners to store their huge amount of potentially sensitive data, such as audios, images, and videos, on remote cloud servers in encrypted form…”
    Get full text
    Journal Article
  10. 10

    A Comprehensive Review on Image Encryption Techniques by Kaur, Manjit, Kumar, Vijay

    ISSN: 1134-3060, 1886-1784
    Published: Dordrecht Springer Netherlands 01.01.2020
    “…Image encryption techniques play a significant role in multimedia applications to secure and authenticate digital images…”
    Get full text
    Journal Article
  11. 11

    No more privacy Concern: A privacy-chain based homomorphic encryption scheme and statistical method for privacy preservation of user’s private and sensitive data by Sathish Kumar, G., Premalatha, K., Uma Maheshwari, G., Rajesh Kanna, P.

    ISSN: 0957-4174, 1873-6793
    Published: Elsevier Ltd 30.12.2023
    Published in Expert systems with applications (30.12.2023)
    “…Internet giants collects a huge volume of data using the modern technologies and apply them to data mining for prediction and decision making in numerous fields, for instance, health care, web…”
    Get full text
    Journal Article
  12. 12

    Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications by Thakur, Sriti, Singh, Amit Kumar, Ghrera, Satya Prakash, Elhoseny, Mohamed

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.02.2019
    Published in Multimedia tools and applications (01.02.2019)
    “… For better confidentiality, we apply the chaos based encryption algorithm on watermarked image in a less complex manner…”
    Get full text
    Journal Article
  13. 13

    Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds by Ge, Chunpeng, Liu, Zhe, Xia, Jinyue, Fang, Liming

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.05.2021
    “… Ensuring a secure data sharing is critical to cloud applications. Recently, a number of identity-based broadcast proxy re-encryption (IB-BPRE…”
    Get full text
    Journal Article
  14. 14

    A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds by Ge, Chunpeng, Susilo, Willy, Baek, Joonsang, Liu, Zhe, Xia, Jinyue, Fang, Liming

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.09.2022
    “…To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-encryption (ABPRE…”
    Get full text
    Journal Article
  15. 15

    A color image encryption technique using block scrambling and chaos by Hosny, Khalid M., Kamal, Sara T., Darwish, Mohamed M.

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.01.2022
    Published in Multimedia tools and applications (01.01.2022)
    “…Images are very important forms of data that are widely used nowadays. Every day, millions of grey and color images are transferred via the web…”
    Get full text
    Journal Article
  16. 16

    Searchable Symmetric Encryption with Forward Search Privacy by Li, Jin, Huang, Yanyu, Wei, Yu, Lv, Siyi, Liu, Zheli, Dong, Changyu, Lou, Wenjing

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.01.2021
    “…Searchable symmetric encryption (SSE) has been widely applied in the encrypted database for queries in practice…”
    Get full text
    Journal Article
  17. 17

    Image encryption based on a combination of multiple chaotic maps by Elkandoz, Marwa Tarek, Alexan, Wassim

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.07.2022
    Published in Multimedia tools and applications (01.07.2022)
    “… This creates a major challenge for researchers to come up with efficient and effective image encryption schemes…”
    Get full text
    Journal Article
  18. 18

    Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption by Liu, Hongjun, Liu, Jian, Ma, Chao

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.07.2023
    Published in Multimedia tools and applications (01.07.2023)
    “… To verify its effectiveness in cryptography, the red, green and blue components of color image are encrypted using three S-Boxes, to further enhance the encryption intensity, three random…”
    Get full text
    Journal Article
  19. 19

    Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity by Chen, Shaobo, Li, Jiguo, Zhang, Yichen, Han, Jinguang

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 15.03.2024
    Published in IEEE internet of things journal (15.03.2024)
    “… To address the above issues, we propose a revocable attribute-based encryption scheme that protects the data integrity (RABE-DI…”
    Get full text
    Journal Article
  20. 20

    Survey on Image Encryption Schemes, Bio cryptography and Efficient Encryption Algorithms by Arul Murugan, Chinnandi, KarthigaiKumar, P.

    ISSN: 1383-469X, 1572-8153
    Published: New York Springer US 01.08.2023
    Published in Mobile networks and applications (01.08.2023)
    “…Cryptography protects the data stored in the network from unauthorized access. It is very essential to transfer data with high security…”
    Get full text
    Journal Article