Showing 81 - 100 results of 213 for search '(optical OR optimal) encryption algorithm', query time: 0.07s Refine Results
  1. 81

    Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments by Faeiz Alserhani

    Published 2024-12-01
    “…User selection is accomplished through robust Deep Reinforcement Learning with the Tabu Search (DRL-TS) algorithm, while channel selection is optimized through rigorous training employing Proximal Policy Optimization (PPO). …”
    Get full text
    Article
  2. 82

    Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme by Xixi Yan, Pengyu Cheng, Yongli Tang, Jing Zhang

    Published 2024-12-01
    “…Locality-sensitive hashing and bloom filters are used to realize multi-keyword fuzzy search, and the bigram segmentation algorithm is optimized for keyword conversion to improve search accuracy. …”
    Get full text
    Article
  3. 83
  4. 84
  5. 85

    The Location Privacy Protection Technology of Mobile Intelligent Terminal by LI Zhi-peng, SUN Ming-song, SONG Zeng-lin

    Published 2018-04-01
    “…Based on the existing encryption and distortion algorithm models,it introduces a coordinate transformation method,increases fragmentation of user location information,and optimizes the technologies of dummies and false-name. …”
    Get full text
    Article
  6. 86
  7. 87

    Image Processing Method Based on Chaotic Encryption and Wavelet Transform for Planar Design by Yiying Liu, Young Chun Ko

    Published 2021-01-01
    “…This paper provides an in-depth study and analysis of image processing for graphic design through chaotic encryption combined with a wavelet transform algorithm. …”
    Get full text
    Article
  8. 88

    Revocable Attribute-Based Encryption with Efficient and Secure Verification in Smart Health Systems by Zhou Chen, Lidong Han, Baokun Hu

    Published 2025-05-01
    “…To address these challenges, we propose a revocable ABE scheme with efficient and secure verification, which not only reduces local computational load by optimizing the encryption algorithm and outsourcing complex operations to the cloud server, but also updates the tag when revocation operation occurs. …”
    Get full text
    Article
  9. 89

    Comparative analysis of NTRUEncrypt modified post-quantum cryptographic system and standard RSA cryptosystem by P. V. Razumov, I. A. Smirnov, I. A. Pilipenko, A. V. Selyova, L. V. Cherkesova

    Published 2019-06-01
    “…A description of the NTRUEncrypt encryption system is proposed. The modification of the considered algorithm is studied; the block diagram of the implementation of the software based on it is presented. …”
    Get full text
    Article
  10. 90
  11. 91

    Precision-Enhanced and Encryption-Mixed Privacy-Preserving Data Aggregation in Wireless Sensor Networks by Geng Yang, Sen Li, Xiaolong Xu, Hua Dai, Zhen Yang

    Published 2013-04-01
    “…Privacy-preserving data aggregation has emerged as an important concern in designing data aggregation algorithm. This paper proposes a precision-enhanced and encryption-mixed privacy-preserving data aggregation (PEPDA) . …”
    Get full text
    Article
  12. 92

    An Angle- and Polarization-Selective Dual-Wavelength Narrowband Thermal Emitter for Infrared Multilevel Encryption by Xuan Zhang, Zhengji Wen, Qingzi Li, Zhanpeng Wang, Yusong Sheng, Zhengai Chen, Wenchao Zhao, Meng Guo, He Zhu, Ning Dai, Yuchuan Shao

    Published 2025-01-01
    “…Therefore, encryption technologies that combine digital algorithms with physical keys to further enhance information security are widely studied. …”
    Get full text
    Article
  13. 93

    Robust zero-watermarking for color images using hybrid deep learning models and encryption by Hager A. Gharib, Noha M. M. Abdelnapi, Khalid M. Hosny

    Published 2025-08-01
    “…Compared to existing zero-watermarking algorithms, the proposed method shows superior robustness and security, making it highly effective for multimedia copyright protection.…”
    Get full text
    Article
  14. 94

    OPTIMIZATION DESIGN OF THE INDEPENDENT WHEEL AXLE-AXLE BASED ON OSF AND RSM by YE Shuang, LIU Qiang, HUANG KunLan, FAN LiZhong, WANG Jie

    Published 2020-01-01
    “…On this basis,Pareto optimal solution of the objective function is obtained based on the filter optimization algorithm and the multi-objective genetic algorithm.Finally,an example is given to demonstrate the effectiveness of the method.…”
    Get full text
    Article
  15. 95
  16. 96

    Hardware Implementation of 128-Bit AES Image Encryption with Low Power Techniques on FPGA to VHDL by Ali Farmani, Hossein Balazadeh Bahar

    Published 2024-02-01
    “…Therefore, we select  a highly secured symmetric key encryption algorithm AES(Advanced Encryption Standard), in order to decrease the power using retiming and glitch and operand isolation techniques in four stages, control unit based on logic gates, optimal design of multiplier blocks in mixcolumn phase and simultaneous production  keys and rounds. …”
    Get full text
    Article
  17. 97

    A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption by Mohamed Elhoseny, Hamdy Elminir, Alaa Riad, Xiaohui Yuan

    Published 2016-07-01
    “…The proposed encryption schema is built upon GASONeC algorithm (Elhoseny et al., 2014) that uses genetic algorithm to build the optimum network structure in the form of clusters. …”
    Get full text
    Article
  18. 98

    Low power IoT device communication through hybrid AES-RSA encryption in MRA mode by Qiang Chang, Tianqi Ma, Wenzhong Yang

    Published 2025-04-01
    “…Therefore, deploying encryption algorithms among edge devices is of paramount importance. …”
    Get full text
    Article
  19. 99

    Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks by Sreeja Balachandran Nair Premakumari, Gopikrishnan Sundaram, Marco Rivera, Patrick Wheeler, Ricardo E. Pérez Guzmán

    Published 2025-03-01
    “…A Hybrid Policy Derivation Algorithm is introduced to balance encryption complexity and computational overhead by dynamically switching between these learning models. …”
    Get full text
    Article
  20. 100

    MAT-FHE: arbitrary dimension matrix multiplication scheme for floating point over fully homomorphic encryption by Yatao Yang, Zhaofu Li, Yucheng Ding, Man Hu

    Published 2025-07-01
    “…The secure matrix operation over homomorphic encryption technology can protect the confidentiality of input data. …”
    Get full text
    Article