Suchergebnisse - "encryption algorithms"

  1. 1

    Survey on JPEG compatible joint image compression and encryption algorithms von Li, Peiya, Lo, Kwok-Tung

    ISSN: 1751-9675, 1751-9683, 1751-9683
    Veröffentlicht: The Institution of Engineering and Technology 01.10.2020
    Veröffentlicht in IET signal processing (01.10.2020)
    “… In recent years, image encryption has been broadly researched. Since a large proportion of images on Internet are compressed, and JPEG is the most widely …”
    Volltext
    Journal Article
  2. 2

    Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms von Hamza, Rafik, Hassan, Alzubair, Ali, Awad, Bashir, Mohammed Bakri, Alqhtani, Samar M., Tawfeeg, Tawfeeg Mohmmed, Yousif, Adil

    ISSN: 1099-4300, 1099-4300
    Veröffentlicht: Switzerland MDPI AG 06.04.2022
    Veröffentlicht in Entropy (06.04.2022)
    “… Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption …”
    Volltext
    Journal Article
  3. 3

    Predicting Diabetes Mellitus with Machine Learning Techniques von Ahmed Jassim, Heba, R. Kadhim, Omar, Khduair Taha, Zahraa, Siaw Paw, Johnny Koh, Tak, Yaw Chong, Kiong, Tiong Sieh

    ISSN: 2710-2165, 2710-2165
    Veröffentlicht: Al-Iraqia University - College of Engineering 19.06.2025
    “… Blood sugar issues are a major health issue worldwide, with their incidence growing rapidly and affecting human health, economic systems, and societal …”
    Volltext
    Journal Article
  4. 4

    Advancing cryptographic security: a novel hybrid AES-RSA model with byte-level tokenization von Durge, Renuka Shone, Deshmukh, Vaishali M.

    ISSN: 2088-8708, 2722-2578
    Veröffentlicht: 01.08.2024
    “… As cyberattacks are getting more complex and sophisticated, stringent, multi-layered security measures are required. Existing approaches often rely on …”
    Volltext
    Journal Article
  5. 5

    Post-Quantum Encryption Algorithms von Pekarčík, Peter, Chovancová, Eva

    ISSN: 1338-3957, 1335-8243, 1338-3957
    Veröffentlicht: Kosice Sciendo 01.09.2025
    Veröffentlicht in Acta electrotechnica et informatica (01.09.2025)
    “… The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason …”
    Volltext
    Journal Article
  6. 6
  7. 7

    A Review of Artificial Intelligence (AI) Applications in Key Generation for Encryption Algorithms von Atheer Ali, Zahraa, Falah Hasan, Hasan

    ISSN: 2710-2165, 2710-2165
    Veröffentlicht: Al-Iraqia University - College of Engineering 01.03.2025
    “…  In the last few years, Artificial Intelligence (AI) has greatly increased. One specific area has seen significant progress: the use of AI in producing key …”
    Volltext
    Journal Article
  8. 8

    Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities von Ahn, Jemin, Hussain, Rasheed, Kang, Kyungtae, Son, Junggab

    ISSN: 2373-745X
    Veröffentlicht: IEEE 2025
    Veröffentlicht in IEEE Communications surveys and tutorials (2025)
    “… Cryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor …”
    Volltext
    Journal Article
  9. 9

    A survey on secure communication techniques for 5G wireless heterogeneous networks von Kakkar, Ajay

    ISSN: 1566-2535, 1872-6305
    Veröffentlicht: Elsevier B.V 01.10.2020
    Veröffentlicht in Information fusion (01.10.2020)
    “… •This paper investigates the role of various data security techniques for 5G networks.•A comparative analysis of symmetrical and asymmetrical cryptographic …”
    Volltext
    Journal Article
  10. 10

    Secure Health Information System with Blockchain Technology von Ibor, Ayei, Edim, Edim, Ojugo, Arnold

    ISSN: 2714-2817, 2714-4704
    Veröffentlicht: Nigerian Society of Physical Sciences 01.05.2023
    Veröffentlicht in Journal of Nigerian Society of Physical Sciences (01.05.2023)
    “… This paper focuses on highlighting the problems that are associated with the absence of privacy and security of medical records in a healthcare system. It …”
    Volltext
    Journal Article
  11. 11
  12. 12

    Network Security from the Perspective of the Internet of Things von Zhou, Ang

    ISSN: 1742-6588, 1742-6596
    Veröffentlicht: Bristol IOP Publishing 01.01.2022
    Veröffentlicht in Journal of physics. Conference series (01.01.2022)
    “… Networking is one of the new technologies supported by our country’s national “125” strategic industry plan, mainly used in medicine, military industry, …”
    Volltext
    Journal Article
  13. 13

    Chaos-based audio encryption: Efficacy of 2D and 3D hyperchaotic systems von Thejas Haridas, Upasana S.D., Vyshnavi G., Malavika S. Krishnan, Sishu Shankar Muni

    ISSN: 2773-1863
    Veröffentlicht: Elsevier 01.09.2024
    Veröffentlicht in Franklin Open (01.09.2024)
    “… Secure communication in the digital age is necessary; securing audio data becomes very critical since this is normally transmitted across susceptible networks …”
    Volltext
    Journal Article
  14. 14

    Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network von Kairaldeen, Ammar Riadh, Abdullah, Nor Fadzilah, Abu-Samah, Asma, Nordin, Rosdiadee

    ISSN: 1424-8220, 1424-8220
    Veröffentlicht: Switzerland MDPI AG 13.02.2023
    Veröffentlicht in Sensors (Basel, Switzerland) (13.02.2023)
    “… Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities …”
    Volltext
    Journal Article
  15. 15

    Large Integer Decomposition Encryption Algorithm for Computer Network Data Communication Combined with Double BP Neural Network Combination Model von Li, Dengjun, Xiong, Shujie, Yuan, Gang

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2023
    Veröffentlicht in Procedia computer science (2023)
    “… Usually a complete computer network system has the following components: source of signals, signal host, cryptographic regime, attack, and interceptor. It is …”
    Volltext
    Journal Article
  16. 16

    Secure communication in the digital age: a new paradigm with graph-based encryption algorithms von Ali, Nasir, Sadiqa, Ayesha, Shahzad, Muhammad Amir, Imran Qureshi, Muhammad, Siddiqui, Hafiz Muhammad Afzal, Abdallah, Suhad Ali Osman, Abd El-Gawaad, Nashaat S.

    ISSN: 2624-9898, 2624-9898
    Veröffentlicht: Frontiers Media S.A 31.10.2024
    Veröffentlicht in Frontiers in computer science (Lausanne) (31.10.2024)
    “… In the contemporary technological landscape, ensuring confidentiality is a paramount concern addressed through various skillsets. Cryptography stands out as a …”
    Volltext
    Journal Article
  17. 17

    Application of Algorithms on Lattices in Post-Quantum Cryptography von Nikolai Urban, Elena Melnikova

    ISSN: 2411-1473
    Veröffentlicht: The Fund for Promotion of Internet media, IT education, human development «League Internet Media 01.03.2024
    “… The article analyzes approaches to the development of post-quantum algorithms, reviews progress in the field of quantum computers and post-quantum …”
    Volltext
    Journal Article
  18. 18

    A tree structure-based improved blockchain framework for a secure online bidding system von Sarfaraz, Aaliya, Chakrabortty, Ripon K., Essam, Daryl L.

    ISSN: 0167-4048, 1872-6208
    Veröffentlicht: Amsterdam Elsevier Ltd 01.03.2021
    Veröffentlicht in Computers & security (01.03.2021)
    “… The BlockChain (BC) is considered as one of the most exciting developments in information and communication technology in the past decade and is widely known …”
    Volltext
    Journal Article
  19. 19

    Light weight encryption algorithms for wireless body area networks von Radhika Rani, CH, Sai Jagan, Lakku, Lakshmi Harika, Ch, V. Durga Ravali Amara, V

    ISSN: 2227-524X, 2227-524X
    Veröffentlicht: 18.04.2018
    “… Wireless Body Area Network (WBAN) emerges as a major network in today’s world. WBAN comprise of sensors used for applications like health monitoring, military, …”
    Volltext
    Journal Article
  20. 20

    Securing a Web-Based Hospital Management System Using a Combination of AES and HMAC von Baban, Alaa, Hameed, Safa

    ISSN: 1814-5892, 2078-6069
    Veröffentlicht: 15.06.2023
    “… The demand for a secured web storage system is increasing daily for its reliability which ensures data privacy and confidentiality. The proposed paper aims to …”
    Volltext
    Journal Article