Suchergebnisse - "Decryption-algorithm"

  1. 1

    A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid von Liu, Yining, Guo, Wei, Fan, Chun-I, Chang, Liang, Cheng, Chi

    ISSN: 1551-3203, 1941-0050
    Veröffentlicht: IEEE 01.03.2019
    Veröffentlicht in IEEE transactions on industrial informatics (01.03.2019)
    “… The real-time electricity consumption data can be used in value-added service such as big data analysis, meanwhile the single user's privacy needs to be …”
    Volltext
    Journal Article
  2. 2

    A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography von Rathore, Manjari Singh, Poongodi, M., Saurabh, Praneet, Lilhore, Umesh Kumar, Bourouis, Sami, Alhakami, Wajdi, Osamor, Jude, Hamdi, Mounir

    ISSN: 0045-7906, 1879-0755
    Veröffentlicht: Elsevier Ltd 01.09.2022
    Veröffentlicht in Computers & electrical engineering (01.09.2022)
    “… •This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method …”
    Volltext
    Journal Article
  3. 3

    Event-based privacy-consensus control for multiagent systems: An enhanced framework for fault-tolerance and protection against eavesdropping von Hu, Xiaoyan, Ye, Dan

    ISSN: 0096-3003
    Veröffentlicht: Elsevier Inc 01.09.2025
    Veröffentlicht in Applied mathematics and computation (01.09.2025)
    “… This paper investigates the consensus problem of privacy protection for multi-agent systems (MASs) under conditions of compound faults. We develop a …”
    Volltext
    Journal Article
  4. 4

    Encryption and decryption algorithm based on the Latin groupoid isotopes von Chiriac, Liubomir, Danilov, Aurel, Bogdanova, Violeta

    ISSN: 2537-6284, 2587-3644
    Veröffentlicht: "Ion Creanga" State Pedagogical University 01.09.2023
    “… This paper studies encryption and decryption algorithm, using isotopes of Latin groupoid. Cryptographic algorithms are computationally intensive processes …”
    Volltext
    Journal Article
  5. 5

    Securecipher: An instantaneous synchronization stream encryption system for insider threat data leakage protection von Herrera Montano, Isabel, Ramos Diaz, Juan, García Aranda, José Javier, Molina-Cardín, Sergio, Guerrero López, Juan José, de la Torre Díez, Isabel

    ISSN: 0957-4174
    Veröffentlicht: Elsevier Ltd 15.11.2024
    Veröffentlicht in Expert systems with applications (15.11.2024)
    “… The paper addresses the persistent challenge of insider threat in cybersecurity. Despite advancements in detection and prevention technologies and approaches, …”
    Volltext
    Journal Article
  6. 6

    A Novel Classical and Quantum Cryptographic Scheme for Data Encryption von Nimbe, Peter, Weyori, Benjamin Asubam, Adekoya, Adebayo Felix

    ISSN: 0020-7748, 1572-9575
    Veröffentlicht: New York Springer US 01.03.2022
    Veröffentlicht in International journal of theoretical physics (01.03.2022)
    “… The protection of data is essential in this digitized world and hence the need for cryptographic techniques to aid in this process. Cryptography in general …”
    Volltext
    Journal Article
  7. 7

    Algebraic Coding Theory Using Pell Equation x2 − 8y2 = 1 von Janaki, G, Gowri, Shankari A

    ISSN: 1592-7415, 2282-8214
    Veröffentlicht: Pescara Accademia Piceno Aprutina dei Velati in Teramo (APAV) 01.03.2023
    Veröffentlicht in Ratio mathematica (01.03.2023)
    “… An interdisciplinary field with significant practical use is cryptography. The difficulty of specific mathematical computing tasks affects a public key …”
    Volltext
    Journal Article
  8. 8

    A plaintext-related image encryption algorithm based on chaos von Zhang, Yong, Tang, Yingjun

    ISSN: 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.03.2018
    Veröffentlicht in Multimedia tools and applications (01.03.2018)
    “… A symmetric key image cryptosystem based on the piecewise linear map is presented in this paper. In this cryptosystem, the encryption process and the …”
    Volltext
    Journal Article
  9. 9

    An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map von Abdelfatah, Roayat Ismail, Saqr, Hager Mohamed, Nasr, Mohamed E.

    ISSN: 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.06.2023
    Veröffentlicht in Multimedia tools and applications (01.06.2023)
    “… A Wireless Body Area Network (WBAN) is a network of wireless sensor nodes that can be installed inside or outside of the human body. This network is crucial in …”
    Volltext
    Journal Article
  10. 10

    FPGA Accelerator for 3DES Algorithm Based on OpenCL von WU Jianfeng, ZHENG Bowen, NIE Yi, CHAI Zhilei

    ISSN: 1000-3428
    Veröffentlicht: Editorial Office of Computer Engineering 01.12.2021
    Veröffentlicht in Ji suan ji gong cheng (01.12.2021)
    “… Nowadays, encryption and decryption algorithms are widely used in digital currency, blockchain, cloud data encryption and other fields.Traditional …”
    Volltext
    Journal Article
  11. 11

    Session key based fast, secure and lightweight image encryption algorithm von Gupta, Manish, Gupta, Kamlesh Kumar, Shukla, Piyush Kumar

    ISSN: 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.03.2021
    Veröffentlicht in Multimedia tools and applications (01.03.2021)
    “… Nowadays, most of the communications in IoT enabled devices are done in the form of images. To protect the images from intruders, there is a need for a secure …”
    Volltext
    Journal Article
  12. 12

    Design of Event-Triggered Secure Containment Controllers for Multi-Agent Systems over Signed Graphs von Zheng, Shaobo, Zhou, Lei

    ISSN: 0278-081X, 1531-5878
    Veröffentlicht: New York Springer US 01.06.2025
    Veröffentlicht in Circuits, systems, and signal processing (01.06.2025)
    “… This paper addresses the secure containment control problem for a class of discrete-time multi-agent systems with eavesdroppers under signed graphs, with a …”
    Volltext
    Journal Article
  13. 13

    Encryption-Decryption-Based Bipartite Synchronization of Markov Jump Coupled Neural Networks: An Event-Triggered Mechanism von Shi, Liangyao, Wang, Jing, Yan, Huaicheng, Cao, Jinde, Shen, Hao

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: IEEE 2025
    Veröffentlicht in IEEE internet of things journal (2025)
    “… This paper addresses the problem of encryption-decryption-based bipartite synchronization control for a class of discrete-time coupled neural networks, in …”
    Volltext
    Journal Article
  14. 14

    Tuna Swarm Optimization with 3D-chaotic map and DNA encoding for image encryption with lossless image compression based on FPGA von B. Hebbale, Sunil, S. Giridhar Akula, V., Baraki, Parashuram

    ISSN: 1847-6996, 1847-7003
    Veröffentlicht: 26.01.2023
    “… Images and video-based multimedia data are growing rapidly due to communication network technology. During image compression and transmission, images are …”
    Volltext
    Journal Article
  15. 15

    A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm von Cai, Wentian, Yao, Huijun

    ISSN: 0929-6212, 1572-834X
    Veröffentlicht: New York Springer US 01.11.2022
    Veröffentlicht in Wireless personal communications (01.11.2022)
    “… In order to solve the problems of low transmission efficiency and high transmission bit error rate in traditional transmission methods, a new secure …”
    Volltext
    Journal Article
  16. 16

    Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover von Gupta, Manish, Gupta, Kamlesh Kumar, Shukla, Piyush Kumar

    ISSN: 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.10.2021
    Veröffentlicht in Multimedia tools and applications (01.10.2021)
    “… In the current era, the majority of communication in IoT-enabled devices, such as smartphones, is now done through images. To shield the images from invaders, …”
    Volltext
    Journal Article
  17. 17

    Word-based encryption algorithm using dictionary indexing with variable encryption key length von Al-Jarrah, Ahmad, Albsharat, Amer, Al-Jarrah, Mohammad

    ISSN: 2088-8708, 2722-2578, 2088-8708
    Veröffentlicht: Yogyakarta IAES Institute of Advanced Engineering and Science 01.02.2022
    “… This paper proposes a new algorithm for text encryption utilizing English words as a unit of encoding. The algorithm vanishes any feature that could be used to …”
    Volltext
    Journal Article
  18. 18

    Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network von Rasheed, Amar, Baza, Mohamed, Badr, Mahmoud. M., Alshahrani, Hani, Choo, Kim-Kwang Raymond

    ISSN: 2327-4697, 2334-329X
    Veröffentlicht: Piscataway IEEE 01.01.2024
    “… Smart vehicles and industrial control systems becoming increasingly complex. They are comprised of a large number of connected intelligence sensor devices. For …”
    Volltext
    Journal Article
  19. 19

    Flame Text Algorithm for Storing Secure Information in Cloud

    ISSN: 2278-3075, 2278-3075
    Veröffentlicht: 26.07.2019
    “… In the present age, we are putting away our information in the cloud; however, there is a great deal of security requests. So as to improve the security, our …”
    Volltext
    Journal Article
  20. 20

    Local thinning of 3D stereo images based on symmetric decryption algorithm von Wu, Chenglin, Li, Zhaoyang

    ISSN: 0141-9331, 1872-9436
    Veröffentlicht: Kidlington Elsevier B.V 01.04.2021
    Veröffentlicht in Microprocessors and microsystems (01.04.2021)
    “… In traditional 3D image thinning methods, because the thinning data is not symmetrical, the skeleton connectivity of 3D image is reduced, and the thinned image …”
    Volltext
    Journal Article