-
81
Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments
Published 2024-12-01“…User selection is accomplished through robust Deep Reinforcement Learning with the Tabu Search (DRL-TS) algorithm, while channel selection is optimized through rigorous training employing Proximal Policy Optimization (PPO). …”
Get full text
Article -
82
Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme
Published 2024-12-01“…Locality-sensitive hashing and bloom filters are used to realize multi-keyword fuzzy search, and the bigram segmentation algorithm is optimized for keyword conversion to improve search accuracy. …”
Get full text
Article -
83
Entropy-Based Block Scrambling Image Encryption Using DES Structure and Chaotic Systems
Published 2019-01-01Get full text
Article -
84
Improving the Integrity of a Voting Process with Biometric Authentication and Data Encryption
Published 2023-04-01Get full text
Article -
85
The Location Privacy Protection Technology of Mobile Intelligent Terminal
Published 2018-04-01“…Based on the existing encryption and distortion algorithm models,it introduces a coordinate transformation method,increases fragmentation of user location information,and optimizes the technologies of dummies and false-name. …”
Get full text
Article -
86
-
87
Image Processing Method Based on Chaotic Encryption and Wavelet Transform for Planar Design
Published 2021-01-01“…This paper provides an in-depth study and analysis of image processing for graphic design through chaotic encryption combined with a wavelet transform algorithm. …”
Get full text
Article -
88
Revocable Attribute-Based Encryption with Efficient and Secure Verification in Smart Health Systems
Published 2025-05-01“…To address these challenges, we propose a revocable ABE scheme with efficient and secure verification, which not only reduces local computational load by optimizing the encryption algorithm and outsourcing complex operations to the cloud server, but also updates the tag when revocation operation occurs. …”
Get full text
Article -
89
Comparative analysis of NTRUEncrypt modified post-quantum cryptographic system and standard RSA cryptosystem
Published 2019-06-01“…A description of the NTRUEncrypt encryption system is proposed. The modification of the considered algorithm is studied; the block diagram of the implementation of the software based on it is presented. …”
Get full text
Article -
90
-
91
Precision-Enhanced and Encryption-Mixed Privacy-Preserving Data Aggregation in Wireless Sensor Networks
Published 2013-04-01“…Privacy-preserving data aggregation has emerged as an important concern in designing data aggregation algorithm. This paper proposes a precision-enhanced and encryption-mixed privacy-preserving data aggregation (PEPDA) . …”
Get full text
Article -
92
An Angle- and Polarization-Selective Dual-Wavelength Narrowband Thermal Emitter for Infrared Multilevel Encryption
Published 2025-01-01“…Therefore, encryption technologies that combine digital algorithms with physical keys to further enhance information security are widely studied. …”
Get full text
Article -
93
Robust zero-watermarking for color images using hybrid deep learning models and encryption
Published 2025-08-01“…Compared to existing zero-watermarking algorithms, the proposed method shows superior robustness and security, making it highly effective for multimedia copyright protection.…”
Get full text
Article -
94
OPTIMIZATION DESIGN OF THE INDEPENDENT WHEEL AXLE-AXLE BASED ON OSF AND RSM
Published 2020-01-01“…On this basis,Pareto optimal solution of the objective function is obtained based on the filter optimization algorithm and the multi-objective genetic algorithm.Finally,an example is given to demonstrate the effectiveness of the method.…”
Get full text
Article -
95
On the Search for Supersingular Elliptic Curves and Their Applications
Published 2025-01-01Get full text
Article -
96
Hardware Implementation of 128-Bit AES Image Encryption with Low Power Techniques on FPGA to VHDL
Published 2024-02-01“…Therefore, we select a highly secured symmetric key encryption algorithm AES(Advanced Encryption Standard), in order to decrease the power using retiming and glitch and operand isolation techniques in four stages, control unit based on logic gates, optimal design of multiplier blocks in mixcolumn phase and simultaneous production keys and rounds. …”
Get full text
Article -
97
A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption
Published 2016-07-01“…The proposed encryption schema is built upon GASONeC algorithm (Elhoseny et al., 2014) that uses genetic algorithm to build the optimum network structure in the form of clusters. …”
Get full text
Article -
98
Low power IoT device communication through hybrid AES-RSA encryption in MRA mode
Published 2025-04-01“…Therefore, deploying encryption algorithms among edge devices is of paramount importance. …”
Get full text
Article -
99
Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks
Published 2025-03-01“…A Hybrid Policy Derivation Algorithm is introduced to balance encryption complexity and computational overhead by dynamically switching between these learning models. …”
Get full text
Article -
100
MAT-FHE: arbitrary dimension matrix multiplication scheme for floating point over fully homomorphic encryption
Published 2025-07-01“…The secure matrix operation over homomorphic encryption technology can protect the confidentiality of input data. …”
Get full text
Article