Showing 21 - 40 results of 213 for search '(optical OR optimal) encryption algorithm', query time: 0.12s Refine Results
  1. 21

    Revocation encryption scheme based on domestic cryptographic algorithm SM9 by XIE Zhenjie, ZHANG Wanli, ZHANG Yao, ZHAO Fangfang, LIU Shengli

    Published 2025-05-01
    “…To address the limitations of lengthy system public keys and inefficient decryption in existing identity-based revocation encryption schemes, an optimized revocation encryption scheme was proposed based on SM9, China’s independently developed identity-based cryptographic algorithm. …”
    Get full text
    Article
  2. 22

    Enhanced Homomorphic Encryption for Cloud Security Through Individual Optimization by Radha Marepalli, Sunitha Vanamala, Manoj Kumar Konda, Venkata Rama Lakshmi Gundala, Prasanthi B.

    Published 2025-01-01
    “…The study that has been suggested makes use of the technique of particle swarm optimization to achieve the goal of enhancing the encryption key. …”
    Get full text
    Article
  3. 23
  4. 24

    Enhancing Cloud Task Scheduling With a Robust Security Approach and Optimized Hybrid POA by S. V. Aswin Kumer, N. Prabakaran, E. Mohan, Balaji Natarajan, G. Sambasivam, Vaibhav Bhushan Tyagi

    Published 2023-01-01
    “…The hybrid optimization enables the proposed algorithm to provide efficient task scheduling by exploiting the strengths of entire algorithms. …”
    Get full text
    Article
  5. 25

    Single-Shot Optical Multiple-Image Encryption Based on Polarization-Resolved Diffractive Imaging by Xiaoliang He, Hua Tao, Lijuan Zhang, Xiaodong Yuan, Cheng Liu, Jianqiang Zhu

    Published 2019-01-01
    “…A new method for optical multiple-image encryption based on polarization-resolved diffraction imaging is proposed in this study. …”
    Get full text
    Article
  6. 26
  7. 27

    A Practical Algorithm for Physical Layer Encryption Under Constant Envelope Constraint by Clement Leroy, Tarak Arbi, Oudomsack Pierre Pasquero, Benoit Geller

    Published 2025-01-01
    “…In this paper, we present a novel mask design algorithm that offers three key advantages compared to state-of-the-art methods: optimal Peak-to-Average Power Ratio (PAPR), applicability to both Gaussian and flat fading channels, and a high level of confidentiality. …”
    Get full text
    Article
  8. 28

    Evaluation of the Effectiveness of Lightweight Encryption Algorithms on Data Performance and Security on IoT Devices by Damar Indrajati, Wahid Miftahul Ashari

    Published 2025-06-01
    “…This research contributes a comparative framework to guide the selection of encryption algorithms for IoT systems, ensuring an optimal trade-off between security and operational efficiency.…”
    Get full text
    Article
  9. 29

    Efficient implementation for BFV fully homomorphic encryption algorithm based on Zynq platform by YANG Yatao, CAO Jingpei, CHEN Liangyu, WANG Wei

    Published 2024-09-01
    “…An efficient implementation scheme for the BFV fully homomorphic encryption algorithm was proposed on the Zynq platform. …”
    Get full text
    Article
  10. 30
  11. 31

    Joint Encryption and Optimization for 6G MEC-Enabled IoT Networks by Manzoor Ahmed, Wali Ullah Khan, Fatma S. Alrayes, Yahia Said, Ali M. Al-Sharafi, Mi-Hye Kim, Khongorzul Dashdondov, Inam Ullah

    Published 2025-01-01
    “…An optimization algorithm is introduced to address these challenges by jointly allocating resources, thereby optimizing throughput, conserving energy, and meeting latency benchmarks through dynamic system adaptation. …”
    Get full text
    Article
  12. 32

    Blockchain Enabled Secure Medical Data Transmission and Diagnosis Using Golden Jackal Optimization Algorithm with Deep Learning by Kiruthikadevi Kulandaivelu, Sivaraj Rajappan, Vijayakumar Murugasamy

    Published 2024-10-01
    “…Also, BC is implemented to store the encrypted imageries. Next, the diagnostic method includes Bayesian optimization algorithm (BOA) based hyper parameter tuning, deep belief network (DBN)-based classification, and CapsNet-based feature extraction. …”
    Get full text
    Article
  13. 33
  14. 34
  15. 35
  16. 36
  17. 37

    A Lightweight Symmetric DNA Encryption Algorithm Inspired by Protein Synthesis (SDEAP) for IoT Devices by DJAA, D., MEKKAOUI, K., BOUKLI-HACENE, S.

    Published 2025-02-01
    “…In this paper, a new lightweight symmetric DNA encryption algorithm inspired by protein synthesis (SDEAP) is proposed. …”
    Get full text
    Article
  18. 38

    Optical audio cryptosystem using hyperchaotic implementation in Gyrator domain by Miao Tian, Yuanyue Cui, Zhengjun Liu, Hang Chen

    Published 2025-05-01
    “…The proposed algorithm involves merging chaos theory with conventional cryptographic techniques to create an optical encryption algorithm that aligns better with the properties of digital audio. …”
    Get full text
    Article
  19. 39

    A new method for decoding an encrypted text by genetic algorithms and its comparison with tabu search and simulated annealing by Mahdi Sadeghzadeh, Mahsa Taherbaghal

    Published 2014-02-01
    “…Genetic Algorithm is an algorithm based on population and many optimization problems are solved with this method, successfully. …”
    Get full text
    Article
  20. 40