Suchergebnisse - "encryption algorithms"
-
1
Survey on JPEG compatible joint image compression and encryption algorithms
ISSN: 1751-9675, 1751-9683, 1751-9683Veröffentlicht: The Institution of Engineering and Technology 01.10.2020Veröffentlicht in IET signal processing (01.10.2020)“… In recent years, image encryption has been broadly researched. Since a large proportion of images on Internet are compressed, and JPEG is the most widely …”
Volltext
Journal Article -
2
Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms
ISSN: 1099-4300, 1099-4300Veröffentlicht: Switzerland MDPI AG 06.04.2022Veröffentlicht in Entropy (06.04.2022)“… Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption …”
Volltext
Journal Article -
3
Predicting Diabetes Mellitus with Machine Learning Techniques
ISSN: 2710-2165, 2710-2165Veröffentlicht: Al-Iraqia University - College of Engineering 19.06.2025Veröffentlicht in Al-Iraqia Journal for Scientific Engineering Research (19.06.2025)“… Blood sugar issues are a major health issue worldwide, with their incidence growing rapidly and affecting human health, economic systems, and societal …”
Volltext
Journal Article -
4
Advancing cryptographic security: a novel hybrid AES-RSA model with byte-level tokenization
ISSN: 2088-8708, 2722-2578Veröffentlicht: 01.08.2024Veröffentlicht in International journal of electrical and computer engineering (Malacca, Malacca) (01.08.2024)“… As cyberattacks are getting more complex and sophisticated, stringent, multi-layered security measures are required. Existing approaches often rely on …”
Volltext
Journal Article -
5
Post-Quantum Encryption Algorithms
ISSN: 1338-3957, 1335-8243, 1338-3957Veröffentlicht: Kosice Sciendo 01.09.2025Veröffentlicht in Acta electrotechnica et informatica (01.09.2025)“… The most used asymmetric encryption algorithm nowadays is RSA. It may become insecure regarding advances in the field of quantum computers. It is the reason …”
Volltext
Journal Article -
6
An efficient construction of S-box based on the fractional-order Rabinovich–Fabrikant chaotic system
ISSN: 0167-9260Veröffentlicht: 01.01.2024Veröffentlicht in Integration (Amsterdam) (01.01.2024)Volltext
Journal Article -
7
A Review of Artificial Intelligence (AI) Applications in Key Generation for Encryption Algorithms
ISSN: 2710-2165, 2710-2165Veröffentlicht: Al-Iraqia University - College of Engineering 01.03.2025Veröffentlicht in Al-Iraqia Journal for Scientific Engineering Research (01.03.2025)“… In the last few years, Artificial Intelligence (AI) has greatly increased. One specific area has seen significant progress: the use of AI in producing key …”
Volltext
Journal Article -
8
Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities
ISSN: 2373-745XVeröffentlicht: IEEE 2025Veröffentlicht in IEEE Communications surveys and tutorials (2025)“… Cryptographic network protocols play a crucial role in enabling secure data exchange over insecure media in modern network environments. However, even minor …”
Volltext
Journal Article -
9
A survey on secure communication techniques for 5G wireless heterogeneous networks
ISSN: 1566-2535, 1872-6305Veröffentlicht: Elsevier B.V 01.10.2020Veröffentlicht in Information fusion (01.10.2020)“… •This paper investigates the role of various data security techniques for 5G networks.•A comparative analysis of symmetrical and asymmetrical cryptographic …”
Volltext
Journal Article -
10
Secure Health Information System with Blockchain Technology
ISSN: 2714-2817, 2714-4704Veröffentlicht: Nigerian Society of Physical Sciences 01.05.2023Veröffentlicht in Journal of Nigerian Society of Physical Sciences (01.05.2023)“… This paper focuses on highlighting the problems that are associated with the absence of privacy and security of medical records in a healthcare system. It …”
Volltext
Journal Article -
11
Deep learning and encryption algorithms based model for enhancing biometric security for artificial intelligence era
ISSN: 1868-5137, 1868-5145Veröffentlicht: 29.08.2024Veröffentlicht in Journal of ambient intelligence and humanized computing (29.08.2024)Volltext
Journal Article -
12
Network Security from the Perspective of the Internet of Things
ISSN: 1742-6588, 1742-6596Veröffentlicht: Bristol IOP Publishing 01.01.2022Veröffentlicht in Journal of physics. Conference series (01.01.2022)“… Networking is one of the new technologies supported by our country’s national “125” strategic industry plan, mainly used in medicine, military industry, …”
Volltext
Journal Article -
13
Chaos-based audio encryption: Efficacy of 2D and 3D hyperchaotic systems
ISSN: 2773-1863Veröffentlicht: Elsevier 01.09.2024Veröffentlicht in Franklin Open (01.09.2024)“… Secure communication in the digital age is necessary; securing audio data becomes very critical since this is normally transmitted across susceptible networks …”
Volltext
Journal Article -
14
Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network
ISSN: 1424-8220, 1424-8220Veröffentlicht: Switzerland MDPI AG 13.02.2023Veröffentlicht in Sensors (Basel, Switzerland) (13.02.2023)“… Blockchain introduces challenges related to the reliability of user identity and identity management systems; this includes detecting unfalsified identities …”
Volltext
Journal Article -
15
Large Integer Decomposition Encryption Algorithm for Computer Network Data Communication Combined with Double BP Neural Network Combination Model
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2023Veröffentlicht in Procedia computer science (2023)“… Usually a complete computer network system has the following components: source of signals, signal host, cryptographic regime, attack, and interceptor. It is …”
Volltext
Journal Article -
16
Secure communication in the digital age: a new paradigm with graph-based encryption algorithms
ISSN: 2624-9898, 2624-9898Veröffentlicht: Frontiers Media S.A 31.10.2024Veröffentlicht in Frontiers in computer science (Lausanne) (31.10.2024)“… In the contemporary technological landscape, ensuring confidentiality is a paramount concern addressed through various skillsets. Cryptography stands out as a …”
Volltext
Journal Article -
17
Application of Algorithms on Lattices in Post-Quantum Cryptography
ISSN: 2411-1473Veröffentlicht: The Fund for Promotion of Internet media, IT education, human development «League Internet Media 01.03.2024Veröffentlicht in Современные информационные технологии и IT-образование (01.03.2024)“… The article analyzes approaches to the development of post-quantum algorithms, reviews progress in the field of quantum computers and post-quantum …”
Volltext
Journal Article -
18
A tree structure-based improved blockchain framework for a secure online bidding system
ISSN: 0167-4048, 1872-6208Veröffentlicht: Amsterdam Elsevier Ltd 01.03.2021Veröffentlicht in Computers & security (01.03.2021)“… The BlockChain (BC) is considered as one of the most exciting developments in information and communication technology in the past decade and is widely known …”
Volltext
Journal Article -
19
Light weight encryption algorithms for wireless body area networks
ISSN: 2227-524X, 2227-524XVeröffentlicht: 18.04.2018Veröffentlicht in International journal of engineering & technology (Dubai) (18.04.2018)“… Wireless Body Area Network (WBAN) emerges as a major network in today’s world. WBAN comprise of sensors used for applications like health monitoring, military, …”
Volltext
Journal Article -
20
Securing a Web-Based Hospital Management System Using a Combination of AES and HMAC
ISSN: 1814-5892, 2078-6069Veröffentlicht: 15.06.2023Veröffentlicht in Iraqi journal for electrical and electronic engineering (15.06.2023)“… The demand for a secured web storage system is increasing daily for its reliability which ensures data privacy and confidentiality. The proposed paper aims to …”
Volltext
Journal Article