Showing 201 - 213 results of 213 for search '(optical OR optimal) encryption algorithm', query time: 0.10s Refine Results
  1. 201

    A deep learning-orchestrated garlic routing architecture for secure telesurgery operations in healthcare 4.0 by Kavit Shah, Nilesh Kumar Jadav, Rajesh Gupta, Sucheta Gupta, Sudeep Tanwar, Joel J.P.C. Rodrigues, Fayez Alqahtani, Amr Tolba

    Published 2025-06-01
    “…ElGamal encryption encrypts the session tags for each telesurgery data relayed between surgeons and the robotic arm. …”
    Get full text
    Article
  2. 202

    Research on Credit Risk Prevention in Supply Chain Finance Driven by Blockchain by Lin Kejing

    Published 2025-01-01
    “…It will also detail the principles and characteristics of blockchain technology, including its decentralized architecture, encryption algorithms, resistance to tampering, smart contract functionalities, and more. …”
    Get full text
    Article
  3. 203

    The Alliance of BIM and Artificial Intelligence: Challenges for a Reinvented Future – The State of the Art by Ellyssa Abdelmoula, Meriem Zammel, Najla Allani

    Published 2025-06-01
    “…It also highlights the importance of data encryption, AI skills development and a comprehensive training framework within organizations to ensure successful implementation of AI-integrated BIM. …”
    Get full text
    Article
  4. 204

    Microservices for information support of multi-agent systems: methods of collection, monitoring and decision-making by A. A. Bryzgalov

    Published 2025-01-01
    “…The research uses methods of building a microservice architecture to separate and autonomously perform functions such as data collection, monitoring and diagnostics in order to optimize SLA and increase system reliability. To increase the system's resilience to security threats, access control, data encryption, and anomaly analysis stages have been added to the algorithms. …”
    Get full text
    Article
  5. 205

    AHA: Design and Evaluation of Compute-Intensive Hardware Accelerators for AMD-Xilinx Zynq SoCs Using HLS IP Flow by David Berrazueta-Mena, Byron Navas

    Published 2025-05-01
    “…The increasing complexity of algorithms in embedded applications has amplified the demand for high-performance computing. …”
    Get full text
    Article
  6. 206

    CareNexus: Integrated solutions for Healthcare Communication by Alexandru Ioan BULZAN

    Published 2025-05-01
    “…A secure authentication based on multiple factors and the use of encryption algorithms, an interface based on different user roles and a prediction system based on model training had been implemented. …”
    Get full text
    Article
  7. 207

    Blockchain Approach for Healthcare Using Fog Topology and Lightweight Consensus by Aya Laouamri, Sarra Cherbal, Yacine Mosbah, Chahrazed Benrebbouh, Kamir Kharoubi

    Published 2025-01-01
    “…The architecture and algorithms for signature generation, encryption, emergency state actions and consensus are developed and evaluated through extensive simulations using the NS3 toolkit.Results: The simulation results validate the effectiveness of the proposed approach in improving healthcare IoT systems. …”
    Get full text
    Article
  8. 208

    BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques by Jing Xiao, Chaoqun Li, Zhigang Li, Jie Zhou

    Published 2024-04-01
    “…The proposed BS-SCRM method is structured in two phases: (1) an enhanced cluster head (CH) election utilizing an elite strategy-enhanced Whale Optimization Algorithm (WOA) that considers node energy and proximity to the base station, and (2) a secure data on-chain phase where blockchain comes into play, encrypting and validating cluster data to safeguard integrity and prevent tampering. …”
    Get full text
    Article
  9. 209

    A systematic review of data privacy in Mobility as a Service (MaaS) by Zineb Garroussi, Antoine Legrain, Sébastien Gambs, Vincent Gautrais, Brunilde Sansò

    Published 2025-05-01
    “…Using the PRISMA framework, a comprehensive literature search across Web of Science, Elsevier, and IEEE Xplore databases resulted in the selection of 32 studies for detailed analysis.The review is structured around three main themes: (1) Privacy-Preserving Techniques, including anonymization strategies (k-anonymity, differential privacy, obfuscation), encryption methods (blockchain, cryptographic protocols), federated learning for decentralized data processing, and advanced algorithms for optimizing privacy budgets and balancing utility-privacy trade-offs; (2) User Trust and Privacy Perceptions, highlighting that trust in service providers is essential for MaaS adoption, privacy concerns may impact adoption but do not necessarily prevent it (the “privacy paradox”), and awareness of data misuse affects user trust and willingness to adopt MaaS; and (3) Regulatory Frameworks, focusing on the importance of GDPR compliance to ensure strict data protection through consent and transparency, and embedding privacy-by-design principles within MaaS architectures to safeguard user data from the outset.This review emphasizes the need for a holistic approach, integrating technological innovation, user-centered design, and strong regulatory oversight to effectively address privacy challenges in MaaS. …”
    Get full text
    Article
  10. 210

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…In the key generation stage, the improved trapdoor diagonal matrix was designed to optimize the original image sampling algorithm required for key generation and reduce the overall time required for generating a large number of keys. …”
    Get full text
    Article
  11. 211

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…In the key generation stage, the improved trapdoor diagonal matrix was designed to optimize the original image sampling algorithm required for key generation and reduce the overall time required for generating a large number of keys. …”
    Get full text
    Article
  12. 212

    Blockchain-enabled verification of medical records using soul-bound tokens and cloud computing by Puneeta Singh, Shrddha Sagar, Sofia Singh, Haya Mesfer Alshahrani, Masresha Getahun, Ben Othman Soufiene

    Published 2024-10-01
    “…Blockchain systems can lower platform costs and determine the optimal allocation of resources across a dispersed network by utilizing deep learning algorithms. …”
    Get full text
    Article
  13. 213

    The application of blockchain with a comparative approach and its impact on risk, flexibility and internal control evaluation by mohammadsadegh aminipoor, HamidReza GholamniaRoshan, azadeh kiapour, Iman Dadashi

    Published 2024-09-01
    “…In general, the use of blockchain can affect the following: Risk: Blockchain minimizes the possibility of changing and falsifying information by using strong encryption and security algorithms. Also, by using distributed technology, the reliability of data access and visibility increases. …”
    Get full text
    Article