Search Results - "decryption algorithm"
-
1
A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid
ISSN: 1551-3203, 1941-0050Published: IEEE 01.03.2019Published in IEEE transactions on industrial informatics (01.03.2019)“…The real-time electricity consumption data can be used in value-added service such as big data analysis, meanwhile the single user's privacy needs to be…”
Get full text
Journal Article -
2
A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
ISSN: 0045-7906, 1879-0755Published: Elsevier Ltd 01.09.2022Published in Computers & electrical engineering (01.09.2022)“…•This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method…”
Get full text
Journal Article -
3
Event-based privacy-consensus control for multiagent systems: An enhanced framework for fault-tolerance and protection against eavesdropping
ISSN: 0096-3003Published: Elsevier Inc 01.09.2025Published in Applied mathematics and computation (01.09.2025)“…This paper investigates the consensus problem of privacy protection for multi-agent systems (MASs) under conditions of compound faults. We develop a…”
Get full text
Journal Article -
4
Encryption and decryption algorithm based on the Latin groupoid isotopes
ISSN: 2537-6284, 2587-3644Published: "Ion Creanga" State Pedagogical University 01.09.2023Published in Acta et Commentationes: Ştiinţe Exacte şi ale Naturii (01.09.2023)“…This paper studies encryption and decryption algorithm, using isotopes of Latin groupoid. Cryptographic algorithms are computationally intensive processes…”
Get full text
Journal Article -
5
Securecipher: An instantaneous synchronization stream encryption system for insider threat data leakage protection
ISSN: 0957-4174Published: Elsevier Ltd 15.11.2024Published in Expert systems with applications (15.11.2024)“…The paper addresses the persistent challenge of insider threat in cybersecurity. Despite advancements in detection and prevention technologies and approaches,…”
Get full text
Journal Article -
6
A Novel Classical and Quantum Cryptographic Scheme for Data Encryption
ISSN: 0020-7748, 1572-9575Published: New York Springer US 01.03.2022Published in International journal of theoretical physics (01.03.2022)“…The protection of data is essential in this digitized world and hence the need for cryptographic techniques to aid in this process. Cryptography in general…”
Get full text
Journal Article -
7
Algebraic Coding Theory Using Pell Equation x2 − 8y2 = 1
ISSN: 1592-7415, 2282-8214Published: Pescara Accademia Piceno Aprutina dei Velati in Teramo (APAV) 01.03.2023Published in Ratio mathematica (01.03.2023)“…An interdisciplinary field with significant practical use is cryptography. The difficulty of specific mathematical computing tasks affects a public key…”
Get full text
Journal Article -
8
A plaintext-related image encryption algorithm based on chaos
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.03.2018Published in Multimedia tools and applications (01.03.2018)“…A symmetric key image cryptosystem based on the piecewise linear map is presented in this paper. In this cryptosystem, the encryption process and the…”
Get full text
Journal Article -
9
An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.06.2023Published in Multimedia tools and applications (01.06.2023)“…A Wireless Body Area Network (WBAN) is a network of wireless sensor nodes that can be installed inside or outside of the human body. This network is crucial in…”
Get full text
Journal Article -
10
FPGA Accelerator for 3DES Algorithm Based on OpenCL
ISSN: 1000-3428Published: Editorial Office of Computer Engineering 01.12.2021Published in Ji suan ji gong cheng (01.12.2021)“…Nowadays, encryption and decryption algorithms are widely used in digital currency, blockchain, cloud data encryption and other fields.Traditional…”
Get full text
Journal Article -
11
Session key based fast, secure and lightweight image encryption algorithm
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.03.2021Published in Multimedia tools and applications (01.03.2021)“…Nowadays, most of the communications in IoT enabled devices are done in the form of images. To protect the images from intruders, there is a need for a secure…”
Get full text
Journal Article -
12
Design of Event-Triggered Secure Containment Controllers for Multi-Agent Systems over Signed Graphs
ISSN: 0278-081X, 1531-5878Published: New York Springer US 01.06.2025Published in Circuits, systems, and signal processing (01.06.2025)“…This paper addresses the secure containment control problem for a class of discrete-time multi-agent systems with eavesdroppers under signed graphs, with a…”
Get full text
Journal Article -
13
Encryption-Decryption-Based Bipartite Synchronization of Markov Jump Coupled Neural Networks: An Event-Triggered Mechanism
ISSN: 2327-4662, 2327-4662Published: IEEE 2025Published in IEEE internet of things journal (2025)“…This paper addresses the problem of encryption-decryption-based bipartite synchronization control for a class of discrete-time coupled neural networks, in…”
Get full text
Journal Article -
14
Tuna Swarm Optimization with 3D-chaotic map and DNA encoding for image encryption with lossless image compression based on FPGA
ISSN: 1847-6996, 1847-7003Published: 26.01.2023Published in International journal of electrical and computer engineering systems (26.01.2023)“…Images and video-based multimedia data are growing rapidly due to communication network technology. During image compression and transmission, images are…”
Get full text
Journal Article -
15
A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm
ISSN: 0929-6212, 1572-834XPublished: New York Springer US 01.11.2022Published in Wireless personal communications (01.11.2022)“…In order to solve the problems of low transmission efficiency and high transmission bit error rate in traditional transmission methods, a new secure…”
Get full text
Journal Article -
16
Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.10.2021Published in Multimedia tools and applications (01.10.2021)“…In the current era, the majority of communication in IoT-enabled devices, such as smartphones, is now done through images. To shield the images from invaders,…”
Get full text
Journal Article -
17
Word-based encryption algorithm using dictionary indexing with variable encryption key length
ISSN: 2088-8708, 2722-2578, 2088-8708Published: Yogyakarta IAES Institute of Advanced Engineering and Science 01.02.2022Published in International journal of electrical and computer engineering (Malacca, Malacca) (01.02.2022)“…This paper proposes a new algorithm for text encryption utilizing English words as a unit of encoding. The algorithm vanishes any feature that could be used to…”
Get full text
Journal Article -
18
Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network
ISSN: 2327-4697, 2334-329XPublished: Piscataway IEEE 01.01.2024Published in IEEE transactions on network science and engineering (01.01.2024)“…Smart vehicles and industrial control systems becoming increasingly complex. They are comprised of a large number of connected intelligence sensor devices. For…”
Get full text
Journal Article -
19
Flame Text Algorithm for Storing Secure Information in Cloud
ISSN: 2278-3075, 2278-3075Published: 26.07.2019Published in International journal of innovative technology and exploring engineering (26.07.2019)“…In the present age, we are putting away our information in the cloud; however, there is a great deal of security requests. So as to improve the security, our…”
Get full text
Journal Article -
20
Local thinning of 3D stereo images based on symmetric decryption algorithm
ISSN: 0141-9331, 1872-9436Published: Kidlington Elsevier B.V 01.04.2021Published in Microprocessors and microsystems (01.04.2021)“…In traditional 3D image thinning methods, because the thinning data is not symmetrical, the skeleton connectivity of 3D image is reduced, and the thinned image…”
Get full text
Journal Article