-
161
Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods
Published 2025-01-01“…As a defense mechanism, DP is applied using the Fourier Perturbation Algorithm (FPA) to optimize padding strategies while maintaining network efficiency. …”
Get full text
Article -
162
An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine
Published 2025-03-01“…By integrating ShangMi cryptographic algorithms and blockchain, it optimizes performance, achieving 35% lower communication overhead than previous protocols. …”
Get full text
Article -
163
-
164
Secure Quantum Communication With Multi-Users in Quantum Networks
Published 2025-01-01“…Quantum Key Distribution (QKD) and encryption protocols are central to secure user-to-user communication in quantum networks. …”
Get full text
Article -
165
Ranking data privacy techniques in cloud computing based on Tamir’s complex fuzzy Schweizer-Sklar aggregation approach
Published 2025-07-01“…The decision-making (DM) landscape in the case of cloud providers, therefore, is extremely complex because they would need to select the optimal approach among the very wide gamut of privacy techniques, which range from encryption to anonymization. …”
Get full text
Article -
166
SC-Route: A Scalable Cross-Layer Secure Routing Method for Multi-Hop Inter-Domain Wireless Networks
Published 2025-05-01“…To address these limitations, we propose a new routing method—the Secure Cross-Layer Route—designed for multi-hop inter-domain wireless networks to achieve unified optimization of security, delay, and throughput. First, we construct a multi-objective optimization model that integrates authentication delay, link load, and resource states, enabling balanced trade-offs between security and transmission performance in dynamic conditions. …”
Get full text
Article -
167
A Student Information Management System Based on Fingerprint Identification and Data Security Transmission
Published 2017-01-01Get full text
Article -
168
Study on the parameters of the matrix NTRU cryptosystem
Published 2025-03-01“…Finally, the efficiency of the improved matrix NTRU was further verified by experiments, and the encryption and decryption speeds were consistent with the theoretical analysis.ConclusionsThe result indicated that the matrix NTRU algorithm, optimized with adjusted parameters, possessed characteristics such as accurate encryption and decryption, as well as high efficiency.…”
Get full text
Article -
169
Analysis on Aigis‐Enc: Asymmetrical and symmetrical
Published 2021-03-01“…Abstract Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). …”
Get full text
Article -
170
A high performance approach to ensure image security during transmission
Published 2025-09-01“…The approach uses RGB plane bit values with a matrix-based encryption scheme, implemented as a symmetric key algorithm. …”
Get full text
Article -
171
M-folding method–based elliptic curve cryptosystem for industrial cyber-physical system
Published 2019-10-01“…This study applies the m-folding method to the highly secure elliptic curve algorithm to improve efficiency and proposes the cryptosystem optimized for the resource-constrained industrial cyber-physical system. …”
Get full text
Article -
172
Noise Impact Analysis in Computer-Generated Holography Based on Dual Metrics Evaluation via Peak Signal-to-Noise Ratio and Structural Similarity Index Measure
Published 2025-05-01“…The findings provide theoretical guidance for noise suppression, parameter optimization, and algorithm selection in CGH systems, advancing its applications in optical encryption and high-precision imaging.…”
Get full text
Article -
173
Generalized Fractional Order Complex Lorenz System-Based Dual Layer Security Enhancement Approach
Published 2025-01-01“…In this paper, the fractional order complex Lorenz system is considered and system parameters are optimized using sequential quadratic programming algorithm by considering a multi objective function. …”
Get full text
Article -
174
Application of Quantum Key Distribution to Enhance Data Security in Agrotechnical Monitoring Systems Using UAVs
Published 2025-02-01“…This study proposes the integration of Quantum Key Distribution (QKD), based on the BB84 protocol, as a secure key management mechanism to enhance data security in UAV-based geographic information systems (GIS) for monitoring agricultural fields and forest fires. QKD is not an encryption algorithm but a secure key distribution protocol that provides information-theoretic security by leveraging the principles of quantum mechanics. …”
Get full text
Article -
175
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
176
Enabling Power Systems With SQKD in Presence of Remote Nodes
Published 2025-01-01“…Due to the complexity of the allocation problem, this paper develops algorithms based on Density-Based Spatial Clustering of Applications with Noise algorithm (DBSCAN), Dijksra’s algorithm and genetic algorithms. …”
Get full text
Article -
177
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
178
Development of biometric systems for passenger identification based on noise-resistant coding means
Published 2021-04-01“…The use of permutation decoding data algorithms capable of adequately corresponding to the particular problems of biometric identification is proposed. …”
Get full text
Article -
179
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01“…Based on the PKC-based RFID authentication protocol cryptoGPS which costs the least resource currently,a low-cost mutual authentication protocol which has a flexible key-management and can realize a mutual authentication was proposed.It adopted a new key-management scheme,an optimized fast Rabin encryption algorithm,low Hamming weight modulus and a lightweight stream cipher algorithm Grain V1,moreover,a new low-cost multiplier was designed to achieve the modulus multiplication on large numbers.The security analysis and simulation experiments carried out on Design Complier with Smic 0.25 μm technique show that this scheme is secure enough and in which the tag just needs 4 530 gates,it is suitable for RFID system.…”
Get full text
Article -
180
Integrated photonic programmable random matrix generator with minimal active components
Published 2025-02-01“…We show that using only two random phase layers is sufficient for producing output optical signals with a white-noise profile, even for highly sparse input optical signals. …”
Get full text
Article