Search Results - "decryption algorithm"

Refine Results
  1. 1

    A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid by Liu, Yining, Guo, Wei, Fan, Chun-I, Chang, Liang, Cheng, Chi

    ISSN: 1551-3203, 1941-0050
    Published: IEEE 01.03.2019
    “…The real-time electricity consumption data can be used in value-added service such as big data analysis, meanwhile the single user's privacy needs to be…”
    Get full text
    Journal Article
  2. 2

    A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography by Rathore, Manjari Singh, Poongodi, M., Saurabh, Praneet, Lilhore, Umesh Kumar, Bourouis, Sami, Alhakami, Wajdi, Osamor, Jude, Hamdi, Mounir

    ISSN: 0045-7906, 1879-0755
    Published: Elsevier Ltd 01.09.2022
    Published in Computers & electrical engineering (01.09.2022)
    “…•This research emphasizes enhancing data security in real-time IoV communication considering secure communication also presents a trust-driven privacy method…”
    Get full text
    Journal Article
  3. 3

    Event-based privacy-consensus control for multiagent systems: An enhanced framework for fault-tolerance and protection against eavesdropping by Hu, Xiaoyan, Ye, Dan

    ISSN: 0096-3003
    Published: Elsevier Inc 01.09.2025
    Published in Applied mathematics and computation (01.09.2025)
    “…This paper investigates the consensus problem of privacy protection for multi-agent systems (MASs) under conditions of compound faults. We develop a…”
    Get full text
    Journal Article
  4. 4

    Encryption and decryption algorithm based on the Latin groupoid isotopes by Chiriac, Liubomir, Danilov, Aurel, Bogdanova, Violeta

    ISSN: 2537-6284, 2587-3644
    Published: "Ion Creanga" State Pedagogical University 01.09.2023
    “…This paper studies encryption and decryption algorithm, using isotopes of Latin groupoid. Cryptographic algorithms are computationally intensive processes…”
    Get full text
    Journal Article
  5. 5

    Securecipher: An instantaneous synchronization stream encryption system for insider threat data leakage protection by Herrera Montano, Isabel, Ramos Diaz, Juan, García Aranda, José Javier, Molina-Cardín, Sergio, Guerrero López, Juan José, de la Torre Díez, Isabel

    ISSN: 0957-4174
    Published: Elsevier Ltd 15.11.2024
    Published in Expert systems with applications (15.11.2024)
    “…The paper addresses the persistent challenge of insider threat in cybersecurity. Despite advancements in detection and prevention technologies and approaches,…”
    Get full text
    Journal Article
  6. 6

    A Novel Classical and Quantum Cryptographic Scheme for Data Encryption by Nimbe, Peter, Weyori, Benjamin Asubam, Adekoya, Adebayo Felix

    ISSN: 0020-7748, 1572-9575
    Published: New York Springer US 01.03.2022
    “…The protection of data is essential in this digitized world and hence the need for cryptographic techniques to aid in this process. Cryptography in general…”
    Get full text
    Journal Article
  7. 7

    Algebraic Coding Theory Using Pell Equation x2 − 8y2 = 1 by Janaki, G, Gowri, Shankari A

    ISSN: 1592-7415, 2282-8214
    Published: Pescara Accademia Piceno Aprutina dei Velati in Teramo (APAV) 01.03.2023
    Published in Ratio mathematica (01.03.2023)
    “…An interdisciplinary field with significant practical use is cryptography. The difficulty of specific mathematical computing tasks affects a public key…”
    Get full text
    Journal Article
  8. 8

    A plaintext-related image encryption algorithm based on chaos by Zhang, Yong, Tang, Yingjun

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.03.2018
    Published in Multimedia tools and applications (01.03.2018)
    “…A symmetric key image cryptosystem based on the piecewise linear map is presented in this paper. In this cryptosystem, the encryption process and the…”
    Get full text
    Journal Article
  9. 9

    An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map by Abdelfatah, Roayat Ismail, Saqr, Hager Mohamed, Nasr, Mohamed E.

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.06.2023
    Published in Multimedia tools and applications (01.06.2023)
    “…A Wireless Body Area Network (WBAN) is a network of wireless sensor nodes that can be installed inside or outside of the human body. This network is crucial in…”
    Get full text
    Journal Article
  10. 10

    FPGA Accelerator for 3DES Algorithm Based on OpenCL by WU Jianfeng, ZHENG Bowen, NIE Yi, CHAI Zhilei

    ISSN: 1000-3428
    Published: Editorial Office of Computer Engineering 01.12.2021
    Published in Ji suan ji gong cheng (01.12.2021)
    “…Nowadays, encryption and decryption algorithms are widely used in digital currency, blockchain, cloud data encryption and other fields.Traditional…”
    Get full text
    Journal Article
  11. 11

    Session key based fast, secure and lightweight image encryption algorithm by Gupta, Manish, Gupta, Kamlesh Kumar, Shukla, Piyush Kumar

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.03.2021
    Published in Multimedia tools and applications (01.03.2021)
    “…Nowadays, most of the communications in IoT enabled devices are done in the form of images. To protect the images from intruders, there is a need for a secure…”
    Get full text
    Journal Article
  12. 12

    Design of Event-Triggered Secure Containment Controllers for Multi-Agent Systems over Signed Graphs by Zheng, Shaobo, Zhou, Lei

    ISSN: 0278-081X, 1531-5878
    Published: New York Springer US 01.06.2025
    Published in Circuits, systems, and signal processing (01.06.2025)
    “…This paper addresses the secure containment control problem for a class of discrete-time multi-agent systems with eavesdroppers under signed graphs, with a…”
    Get full text
    Journal Article
  13. 13

    Encryption-Decryption-Based Bipartite Synchronization of Markov Jump Coupled Neural Networks: An Event-Triggered Mechanism by Shi, Liangyao, Wang, Jing, Yan, Huaicheng, Cao, Jinde, Shen, Hao

    ISSN: 2327-4662, 2327-4662
    Published: IEEE 2025
    Published in IEEE internet of things journal (2025)
    “…This paper addresses the problem of encryption-decryption-based bipartite synchronization control for a class of discrete-time coupled neural networks, in…”
    Get full text
    Journal Article
  14. 14

    Tuna Swarm Optimization with 3D-chaotic map and DNA encoding for image encryption with lossless image compression based on FPGA by B. Hebbale, Sunil, S. Giridhar Akula, V., Baraki, Parashuram

    ISSN: 1847-6996, 1847-7003
    Published: 26.01.2023
    “…Images and video-based multimedia data are growing rapidly due to communication network technology. During image compression and transmission, images are…”
    Get full text
    Journal Article
  15. 15

    A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm by Cai, Wentian, Yao, Huijun

    ISSN: 0929-6212, 1572-834X
    Published: New York Springer US 01.11.2022
    Published in Wireless personal communications (01.11.2022)
    “…In order to solve the problems of low transmission efficiency and high transmission bit error rate in traditional transmission methods, a new secure…”
    Get full text
    Journal Article
  16. 16

    Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover by Gupta, Manish, Gupta, Kamlesh Kumar, Shukla, Piyush Kumar

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.10.2021
    Published in Multimedia tools and applications (01.10.2021)
    “…In the current era, the majority of communication in IoT-enabled devices, such as smartphones, is now done through images. To shield the images from invaders,…”
    Get full text
    Journal Article
  17. 17

    Word-based encryption algorithm using dictionary indexing with variable encryption key length by Al-Jarrah, Ahmad, Albsharat, Amer, Al-Jarrah, Mohammad

    ISSN: 2088-8708, 2722-2578, 2088-8708
    Published: Yogyakarta IAES Institute of Advanced Engineering and Science 01.02.2022
    “…This paper proposes a new algorithm for text encryption utilizing English words as a unit of encoding. The algorithm vanishes any feature that could be used to…”
    Get full text
    Journal Article
  18. 18

    Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network by Rasheed, Amar, Baza, Mohamed, Badr, Mahmoud. M., Alshahrani, Hani, Choo, Kim-Kwang Raymond

    ISSN: 2327-4697, 2334-329X
    Published: Piscataway IEEE 01.01.2024
    “…Smart vehicles and industrial control systems becoming increasingly complex. They are comprised of a large number of connected intelligence sensor devices. For…”
    Get full text
    Journal Article
  19. 19

    Flame Text Algorithm for Storing Secure Information in Cloud

    ISSN: 2278-3075, 2278-3075
    Published: 26.07.2019
    “…In the present age, we are putting away our information in the cloud; however, there is a great deal of security requests. So as to improve the security, our…”
    Get full text
    Journal Article
  20. 20

    Local thinning of 3D stereo images based on symmetric decryption algorithm by Wu, Chenglin, Li, Zhaoyang

    ISSN: 0141-9331, 1872-9436
    Published: Kidlington Elsevier B.V 01.04.2021
    Published in Microprocessors and microsystems (01.04.2021)
    “…In traditional 3D image thinning methods, because the thinning data is not symmetrical, the skeleton connectivity of 3D image is reduced, and the thinned image…”
    Get full text
    Journal Article