Výsledky vyhľadávania - Authentication and encryption algorithm
-
1
Image authentication and encryption algorithm based on RSA cryptosystem and chaotic maps
ISSN: 0957-4174Vydavateľské údaje: Elsevier Ltd 15.05.2025Vydané v Expert systems with applications (15.05.2025)“… Therefore, to overcome these security crises, cryptographers need to develop efficient and robust encryption algorithms…”
Získať plný text
Journal Article -
2
Two-phase authentication and encryption algorithm for mobile users
Vydavateľské údaje: IEEE 01.05.2018Vydané v 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR) (01.05.2018)“… and corresponding, efficient solutions, applicable for encryption and authentication purposes in an end-to-end information exchange among mobile users…”
Získať plný text
Konferenčný príspevok.. -
3
ERSS-RLNC: Efficient and robust secure scheme for random linear network coding
ISSN: 1389-1286, 1872-7069Vydavateľské údaje: Kidlington Elsevier B.V 24.12.2014Vydané v Computer networks (Amsterdam, Netherlands : 1999) (24.12.2014)“…–encryption scheme that is immune to Byzantine and eavesdropping attacks. The proposed scheme achieves simultaneously information confidentiality, packet integrity and source authentication with minimum computational complexity and memory consumption…”
Získať plný text
Journal Article -
4
Authentication and Encryption algorithms for data security in Cloud computing: A comprehensive review
ISSN: 2300-5963Vydavateľské údaje: Polish Information Processing Society 01.01.2022Vydané v Annals of Computer Science and Information Systems (01.01.2022)Získať plný text
Journal Article -
5
SVD-based image compression, encryption, and identity authentication algorithm on cloud
ISSN: 1751-9659, 1751-9667Vydavateľské údaje: The Institution of Engineering and Technology 17.10.2019Vydané v IET image processing (17.10.2019)“…Based on singular value decomposition (SVD), an image compression, encryption, and identity authentication scheme is proposed here…”
Získať plný text
Journal Article -
6
Design and implementation of low-cost hardware architecture for authentication encryption algorithm SM4-GCM
ISSN: 2096-3750Vydavateľské údaje: China InfoCom Media Group 30.12.2023Vydané v 物联网学报 (30.12.2023)“… security.To ensure the security of such data, a cost-effective, multifunctional hardware architecture design based on the Chinese authenticated encryption algorithm SM4-GCM (Galois/Counter Mode…”
Získať plný text
Journal Article -
7
Design and implementation of low-cost hardware architecture for authentication encryption algorithm SM4-GCM
ISSN: 2096-3750Vydavateľské údaje: China InfoCom Media Group 01.12.2023Vydané v 物联网学报 (01.12.2023)“… security.To ensure the security of such data, a cost-effective, multifunctional hardware architecture design based on the Chinese authenticated encryption algorithm SM4-GCM (Galois/Counter Mode…”
Získať plný text
Journal Article -
8
Color image encryption and authentication algorithm integrating computational ghost imaging with quaternion multi-parameter discrete fractional angular transform
ISSN: 0957-4174Vydavateľské údaje: Elsevier Ltd 10.03.2026Vydané v Expert systems with applications (10.03.2026)“… Given the urgent need for secure and authentic image transmission, a color image encryption and authentication algorithm is designed based on computational ghost imaging (CGI…”
Získať plný text
Journal Article -
9
An optical-based encryption and authentication algorithm for color and grayscale medical images
ISSN: 1380-7501, 1573-7721Vydavateľské údaje: New York Springer US 01.06.2023Vydané v Multimedia tools and applications (01.06.2023)“… Therefore, this research was motivated to introduce a more efficient algorithm that achieves several essential security requirements such as authentication, confidentiality, and integrity…”
Získať plný text
Journal Article -
10
A client-based user authentication and encryption algorithm for secure accessing to cloud servers based on modified Diffie-Hellman and RSA small-e
Vydavateľské údaje: IEEE 01.12.2013Vydané v 2013 IEEE Student Conference on Research and Developement (01.12.2013)“… The proposed model will contain an eligible algorithm to solve data protection and user authentication problems…”
Získať plný text
Konferenčný príspevok.. -
11
Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm
ISSN: 1386-7857, 1573-7543Vydavateľské údaje: New York Springer US 01.09.2024Vydané v Cluster computing (01.09.2024)“… The objective of this study is to develop a blockchain and fog computing model that implements secure data access control mechanisms for distributed data storage and authentication using a hybrid encryption algorithm…”
Získať plný text
Journal Article -
12
A High Throughput and Secure Authentication-Encryption AES-CCM Algorithm on Asynchronous Multicore Processor
ISSN: 1556-6013, 1556-6021Vydavateľské údaje: New York IEEE 01.04.2019Vydané v IEEE transactions on information forensics and security (01.04.2019)“…We propose an authentication-based matrix-transformation cum parallel-encryption implemented on an asynchronous multicore processor (AMP-MP…”
Získať plný text
Journal Article -
13
Efficient and Secure Cancelable Biometric Authentication Framework Based on Genetic Encryption Algorithm
ISSN: 2169-3536, 2169-3536Vydavateľské údaje: Piscataway IEEE 2021Vydané v IEEE access (2021)“… Thus, our main contribution is presenting a novel authentication framework based on the evolutionary Genetic Algorithm (GA…”
Získať plný text
Journal Article -
14
Distributed Identity Authentication with Lenstra–Lenstra–Lovász Algorithm–Ciphertext Policy Attribute-Based Encryption from Lattices: An Efficient Approach Based on Ring Learning with Errors Problem
ISSN: 1099-4300, 1099-4300Vydavateľské údaje: Switzerland MDPI AG 27.08.2024Vydané v Entropy (Basel, Switzerland) (27.08.2024)“… Because a traditional single authority can cause the potential single point of failure, an improved lattice-based quantum-resistant identity authentication and policy attribute encryption scheme…”
Získať plný text
Journal Article -
15
Security Verification of an Authentication Algorithm Based on Verifiable Encryption
ISSN: 2078-2489, 2078-2489Vydavateľské údaje: Basel MDPI AG 01.02.2023Vydané v Information (01.02.2023)“…) As a result of implementing the VE-based authentication algorithm using the one-time pad, the encryption, verification, and decryption processing times are less than 1 ms even with a text length of 8192 bits…”
Získať plný text
Journal Article -
16
RETRACTED ARTICLE: An improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in WSN
ISSN: 1868-5137, 1868-5145Vydavateľské údaje: Berlin/Heidelberg Springer Berlin Heidelberg 01.12.2022Vydané v Journal of ambient intelligence and humanized computing (01.12.2022)Získať plný text
Journal Article -
17
A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices
ISSN: 2327-4662, 2327-4662Vydavateľské údaje: Piscataway IEEE 15.09.2022Vydané v IEEE internet of things journal (15.09.2022)“…In this work, we propose three efficient variants of a message authentication encryption (MAE…”
Získať plný text
Journal Article -
18
Research on Forgery Attack on Authentication Encryption Algorithm ACE
ISSN: 2693-2865Vydavateľské údaje: IEEE 17.06.2022Vydané v IEEE Joint International Information Technology and Artificial Intelligence Conference (ITAIC ... ) (Online) (17.06.2022)“…The ACE authentication encryption algorithm is an algorithm designed by Aagaard et al…”
Získať plný text
Konferenčný príspevok.. -
19
ADVANCED TECHNOLOGIES FOR CYBERSECURITY: ENCRYPTION, AUTHENTICATION, AND ANOMALY DETECTION ALGORITHMS
ISSN: 2285-424X, 2343-8134Vydavateľské údaje: Timisoara Dimitrie Cantemir Christian University, Faculty of Management in Tourism and Commerce Tourism 01.11.2024Vydané v Quaestus (Timio̦ara) (01.11.2024)“…In cyber security, algorithms are essential for data protection, user authentication, and access control…”
Získať plný text
Journal Article -
20
Secure data transmission method of end-to-end communication network based on port isolation technology and encryption authentication algorithm
Vydavateľské údaje: IEEE 12.07.2024Vydané v 2024 7th International Conference on Computer Information Science and Application Technology (CISAT) (12.07.2024)“… Therefore, a secure transmission method of end-to-end communication network data based on port isolation technology and encryption authentication algorithm is proposed…”
Získať plný text
Konferenčný príspevok..