Search Results - distributed decryption algorithm

Refine Results
  1. 1

    A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid by Liu, Yining, Guo, Wei, Fan, Chun-I, Chang, Liang, Cheng, Chi

    ISSN: 1551-3203, 1941-0050
    Published: IEEE 01.03.2019
    “…The real-time electricity consumption data can be used in value-added service such as big data analysis, meanwhile the single user's privacy needs to be…”
    Get full text
    Journal Article
  2. 2

    Distributed Economic Dispatch of Microgrids Based on ADMM Algorithms With Encryption-Decryption Rules by Sun, Lei, Ding, Derui, Dong, Hongli, Yi, Xiaojian

    ISSN: 1545-5955, 1558-3783
    Published: IEEE 01.01.2025
    “… As such, this paper presents a distributed ED algorithm based on the alternating direction method of multipliers (ADMM…”
    Get full text
    Journal Article
  3. 3

    Quantized Distributed Economic Dispatch for Microgrids: Paillier Encryption-Decryption Scheme by Chen, Wei, Wang, Zidong, Ge, Quanbo, Dong, Hongli, Liu, Guo-Ping

    ISSN: 1551-3203, 1941-0050
    Published: Piscataway IEEE 01.04.2024
    “… A quantized distributed optimization algorithm using the Paillier encryption-decryption scheme is developed…”
    Get full text
    Journal Article
  4. 4

    Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain Systems by Zhao, Hongjian, Tao, Yunting, Kong, Fanyu, Zhang, Guoyan, Zhang, Hanlin, Yu, Jia

    ISSN: 2158-9208
    Published: IEEE 30.10.2024
    “… of the factors limiting blockchain efficiency. This paper proposes a novel distributed computing algorithm for polynomial multiplication, applicable in blockchain decryption…”
    Get full text
    Conference Proceeding
  5. 5

    Encryption-decryption-based distributed state estimation against eavesdropping attacks over sensor networks with communication protocol by Yang, Xiaolong, Chen, Wen, Zhang, Hongxu, Zhang, Jiawen, Guo, Yuxin

    ISSN: 0925-2312
    Published: Elsevier B.V 28.12.2025
    Published in Neurocomputing (Amsterdam) (28.12.2025)
    “… The primary objective of this paper is to present a distributed state estimation algorithm with recursive format for such time-varying systems, in which an upper bound on the estimation…”
    Get full text
    Journal Article
  6. 6

    A Hybrid Encryption and Decryption Algorithm using Caesar and Vigenere Cipher by Tan, Camille Merlin S., Arada, Gerald P., Abad, Alexander C., Magsino, Elmer R.

    ISSN: 1742-6588, 1742-6596
    Published: Bristol IOP Publishing 01.08.2021
    Published in Journal of physics. Conference series (01.08.2021)
    “…This paper presents a hybrid encryption and decryption algorithm, which combines the concept of Caesar Cipher and Vigenere Cipher algorithms…”
    Get full text
    Journal Article
  7. 7

    Encryption–decryption‐based event‐triggered consensus control for nonlinear MASs under DoS attacks by Zhang, Shuhua, Ma, Lifeng, Liu, Hongjian

    ISSN: 1049-8923, 1099-1239
    Published: Bognor Regis Wiley Subscription Services, Inc 10.01.2024
    “…; and on the other hand, an encryption–decryption mechanism is designed with the aim to provide compensation, thereby mitigating the DoS attack effects…”
    Get full text
    Journal Article
  8. 8

    Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System by Zhang, Yudi, He, Debiao, Obaidat, Mohammad S., Vijayakumar, Pandi, Hsiao, Kuei-Fang

    ISSN: 0733-8716, 1558-0008
    Published: New York IEEE 01.02.2021
    “…The rapid development of the Internet of Things (IoT) has led to the emergence of more and more novel applications in recent years. One of them is the e-health…”
    Get full text
    Journal Article
  9. 9

    Fault-Tolerant Consensus Control for Multiagent Systems: An Encryption-Decryption Scheme by Gao, Chen, Wang, Zidong, He, Xiao, Dong, Hongli

    ISSN: 0018-9286, 1558-2523
    Published: New York IEEE 01.05.2022
    Published in IEEE transactions on automatic control (01.05.2022)
    “… to other agents through a directed topology. After being received, the codewords are then decrypted by the corresponding decryption algorithm and subsequently utilized to design the consensus controller. By constructing a novel matrix norm along with its compatible vector norm, we obtain a necessary and sufficient condition, which serves as an index in the observer and the controller design. In the end, a simulation example is given to demonstrate the validity of the results in this article…”
    Get full text
    Journal Article
  10. 10

    Secure Zonotopic Set-Membership State Estimation for Multirate Complex Networks Under Encryption-Decryption Mechanism by Yang, Hao, Yan, Huaicheng, Li, Yan, Wen, Paul, Yang, Fuwen

    ISSN: 0018-9286, 1558-2523
    Published: New York IEEE 01.08.2024
    Published in IEEE transactions on automatic control (01.08.2024)
    “…In this article, the zonotope-based distributed set-membership state estimation problem is considered for a class of nonlinear multirate complex networks (MRCN…”
    Get full text
    Journal Article
  11. 11

    Encryption-decryption-based state estimation for nonlinear complex networks subject to coupled perturbation by Gao, Peixia, Jia, Chaoqing, Zhou, Aozhan

    ISSN: 2164-2583, 2164-2583
    Published: Macclesfield Taylor & Francis 31.12.2024
    Published in Systems science & control engineering (31.12.2024)
    “…This paper discusses the encryption-decryption-based state estimation (EDBSE) issue for coupled perturbation complex networks (CPCNs…”
    Get full text
    Journal Article
  12. 12

    Edge-event-triggered encryption-decryption observer-based control of multiagent systems for privacy protection under multiple cyber attacks by Guo, Xiang-Gui, Wang, Bo-Qun, Wang, Jian-Liang, Ahn, Choon Ki, Wu, Zheng-Guang

    ISSN: 0020-0255, 1872-6291
    Published: Elsevier Inc 01.09.2023
    Published in Information sciences (01.09.2023)
    “…) under undirected topology and multiple cyber attacks. An observer-based dynamic cryptography-based encryption-decryption (CED…”
    Get full text
    Journal Article
  13. 13

    SM9-based device-friendly distributed decryption scheme for IoHT by Li, Longjiao, Lai, Jianchang, Chen, Liquan, Zhao, Zhen, Wu, Ge, Yang, Xinyan

    ISSN: 0920-5489
    Published: Elsevier B.V 01.03.2026
    Published in Computer standards and interfaces (01.03.2026)
    “… To address this issue, this paper proposes an efficient distributed decryption scheme based on SM9…”
    Get full text
    Journal Article
  14. 14

    R-LWE-Based Distributed Key Generation and Threshold Decryption by Alborch, Ferran, Martínez, Ramiro, Morillo, Paz

    ISSN: 2227-7390, 2227-7390
    Published: Basel MDPI AG 01.03.2022
    Published in Mathematics (Basel) (01.03.2022)
    “…) or Ring Learning with Errors (R-LWE). Furthermore, the application of cryptographic techniques to different areas, like electronic voting, has also nourished a great interest in distributed cryptography…”
    Get full text
    Journal Article
  15. 15

    Distributed fusion filtering for multi-rate nonlinear systems with binary measurements under encryption and decryption scheme by Hu, Jun, Fan, Shuting, Caballero-Águila, Raquel, Zhu, Mingqing, Zhang, Guangchen

    ISSN: 1566-2535
    Published: Elsevier B.V 01.05.2025
    Published in Information fusion (01.05.2025)
    “… Based on the information obtained, the local distributed filtering algorithm is proposed to obtain an upper bound on the local filtering…”
    Get full text
    Journal Article
  16. 16

    Towards data storage scheme in blockchain based serverless environment: AES encryption and decryption algorithm approach by Kandpal, Meenakshi, Pritwani, Yash, Misra, Chinmaya, Yadav, Amrendra, Barik, Rabindra

    ISSN: 0353-3670, 2217-5997
    Published: 01.06.2024
    “… In this research, we propose an innovative framework that leverages the benefits of blockchain technology to securely handle and store data in a serverless environment of distributed nodes…”
    Get full text
    Journal Article
  17. 17

    Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud by Chen, Yange, Zhao, Qingqing, Duan, Pu, Zhang, Benyu, Hong, Zhiyong, Wang, Baocang

    ISSN: 0957-4174, 1873-6793
    Published: New York Elsevier Ltd 01.09.2022
    Published in Expert systems with applications (01.09.2022)
    “…) using distributed decryption mechanism on the cloud. First, the scheme adopts distributed decryption to complete…”
    Get full text
    Journal Article
  18. 18

    Optimization of RSA encryption and decryption process with distributed computing method by Arief, S N, Firdaus, V A H, Prasetyo, A

    ISSN: 1757-8981, 1757-899X
    Published: Bristol IOP Publishing 01.04.2020
    “… The test results showed that the implementation of Distributed Computing method made the encryption and decryption process finished faster…”
    Get full text
    Journal Article
  19. 19

    Hybrid Encryption Algorithm for Big Data Security in the Hadoop Distributed File System by T. Mohanraj, R. Santhosh

    ISSN: 2299-3649, 2956-5839
    Published: Institute of Fundamental Technological Research Polish Academy of Sciences 01.01.2022
    “… The Hadoop distributed file system (HDFS) is an application introduced for efficient big data processing…”
    Get full text
    Journal Article
  20. 20

    A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things by Zhang, Zhishuo, Zhou, Shijie

    ISSN: 1389-1286, 1872-7069
    Published: Amsterdam Elsevier B.V 24.12.2021
    “…Internet of Things (IoT) networks has been widely deployed as the distributed computing and communication component in the smart city…”
    Get full text
    Journal Article