Showing 161 - 180 results of 213 for search '(optical OR optimal) encryption algorithm', query time: 0.11s Refine Results
  1. 161

    Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods by Ahmet Emre Ergun, Ozgu Can, Murat Kantarcioglu

    Published 2025-01-01
    “…As a defense mechanism, DP is applied using the Fourier Perturbation Algorithm (FPA) to optimize padding strategies while maintaining network efficiency. …”
    Get full text
    Article
  2. 162

    An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine by Yishan Wu, Mengxue Pang, Jianqiang Ma, Wei Ou, Qiuling Yue, Wenbao Han

    Published 2025-03-01
    “…By integrating ShangMi cryptographic algorithms and blockchain, it optimizes performance, achieving 35% lower communication overhead than previous protocols. …”
    Get full text
    Article
  3. 163
  4. 164

    Secure Quantum Communication With Multi-Users in Quantum Networks by As'Ad Mahmoud As'Ad Alnaser, Hazem Moh'D Said Hatamleh, Nawaf Abdualziz Almolhis, Salahaldeen Duraibi, Yahya Alqahtani

    Published 2025-01-01
    “…Quantum Key Distribution (QKD) and encryption protocols are central to secure user-to-user communication in quantum networks. …”
    Get full text
    Article
  5. 165

    Ranking data privacy techniques in cloud computing based on Tamir’s complex fuzzy Schweizer-Sklar aggregation approach by Jabbar Ahmmad, Hamiden Abd El-Wahed Khalifa, Hafiz Muhammad Waqas, Alhanouf Alburaikan, Taha Radwan

    Published 2025-07-01
    “…The decision-making (DM) landscape in the case of cloud providers, therefore, is extremely complex because they would need to select the optimal approach among the very wide gamut of privacy techniques, which range from encryption to anonymization. …”
    Get full text
    Article
  6. 166

    SC-Route: A Scalable Cross-Layer Secure Routing Method for Multi-Hop Inter-Domain Wireless Networks by Yanbing Li, Yang Zhu, Shangpeng Wang

    Published 2025-05-01
    “…To address these limitations, we propose a new routing method—the Secure Cross-Layer Route—designed for multi-hop inter-domain wireless networks to achieve unified optimization of security, delay, and throughput. First, we construct a multi-objective optimization model that integrates authentication delay, link load, and resource states, enabling balanced trade-offs between security and transmission performance in dynamic conditions. …”
    Get full text
    Article
  7. 167
  8. 168

    Study on the parameters of the matrix NTRU cryptosystem by LI Zichen, WU Qinghao, SONG Jiashuo, PENG Haipeng

    Published 2025-03-01
    “…Finally, the efficiency of the improved matrix NTRU was further verified by experiments, and the encryption and decryption speeds were consistent with the theoretical analysis.ConclusionsThe result indicated that the matrix NTRU algorithmoptimized with adjusted parameters, possessed characteristics such as accurate encryption and decryption, as well as high efficiency.…”
    Get full text
    Article
  9. 169

    Analysis on Aigis‐Enc: Asymmetrical and symmetrical by Yupu Hu, Siyue Dong, Xingting Dong

    Published 2021-03-01
    “…Abstract Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). …”
    Get full text
    Article
  10. 170

    A high performance approach to ensure image security during transmission by Adithya S Nair, Charvi Upreti, Advaith Arun, Renuka Devi S

    Published 2025-09-01
    “…The approach uses RGB plane bit values with a matrix-based encryption scheme, implemented as a symmetric key algorithm. …”
    Get full text
    Article
  11. 171

    M-folding method–based elliptic curve cryptosystem for industrial cyber-physical system by Taehoon Do, Seungwoo Park, Jaehwan Lee, Sangoh Park

    Published 2019-10-01
    “…This study applies the m-folding method to the highly secure elliptic curve algorithm to improve efficiency and proposes the cryptosystem optimized for the resource-constrained industrial cyber-physical system. …”
    Get full text
    Article
  12. 172

    Noise Impact Analysis in Computer-Generated Holography Based on Dual Metrics Evaluation via Peak Signal-to-Noise Ratio and Structural Similarity Index Measure by Yucheng Li, Yang Zhang, Deyu Jia, Song Gao, Muqun Zhang

    Published 2025-05-01
    “…The findings provide theoretical guidance for noise suppression, parameter optimization, and algorithm selection in CGH systems, advancing its applications in optical encryption and high-precision imaging.…”
    Get full text
    Article
  13. 173

    Generalized Fractional Order Complex Lorenz System-Based Dual Layer Security Enhancement Approach by K. Meera, N. Selvaganesan

    Published 2025-01-01
    “…In this paper, the fractional order complex Lorenz system is considered and system parameters are optimized using sequential quadratic programming algorithm by considering a multi objective function. …”
    Get full text
    Article
  14. 174

    Application of Quantum Key Distribution to Enhance Data Security in Agrotechnical Monitoring Systems Using UAVs by Makhabbat Bakyt, Luigi La Spada, Nida Zeeshan, Khuralay Moldamurat, Sabyrzhan Atanov

    Published 2025-02-01
    “…This study proposes the integration of Quantum Key Distribution (QKD), based on the BB84 protocol, as a secure key management mechanism to enhance data security in UAV-based geographic information systems (GIS) for monitoring agricultural fields and forest fires. QKD is not an encryption algorithm but a secure key distribution protocol that provides information-theoretic security by leveraging the principles of quantum mechanics. …”
    Get full text
    Article
  15. 175

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  16. 176

    Enabling Power Systems With SQKD in Presence of Remote Nodes by Mariam Gado, Muhammad Ismail

    Published 2025-01-01
    “…Due to the complexity of the allocation problem, this paper develops algorithms based on Density-Based Spatial Clustering of Applications with Noise algorithm (DBSCAN), Dijksra’s algorithm and genetic algorithms. …”
    Get full text
    Article
  17. 177

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  18. 178

    Development of biometric systems for passenger identification based on noise-resistant coding means by A. A. Gladkikh, A. K. Volkov, T. G. Ulasyuk

    Published 2021-04-01
    “…The use of permutation decoding data algorithms capable of adequately corresponding to the particular problems of biometric identification is proposed. …”
    Get full text
    Article
  19. 179

    A Low-Cost PKC-Based RFID Mutual Authentication Protocol by Lili Wei, Qingkuan Dong, Wenxiu Ding

    Published 2013-10-01
    “…Based on the PKC-based RFID authentication protocol cryptoGPS which costs the least resource currently,a low-cost mutual authentication protocol which has a flexible key-management and can realize a mutual authentication was proposed.It adopted a new key-management scheme,an optimized fast Rabin encryption algorithm,low Hamming weight modulus and a lightweight stream cipher algorithm Grain V1,moreover,a new low-cost multiplier was designed to achieve the modulus multiplication on large numbers.The security analysis and simulation experiments carried out on Design Complier with Smic 0.25 μm technique show that this scheme is secure enough and in which the tag just needs 4 530 gates,it is suitable for RFID system.…”
    Get full text
    Article
  20. 180

    Integrated photonic programmable random matrix generator with minimal active components by Kevin Zelaya, Mostafa Honari-Latifpour, Mohammad-Ali Miri

    Published 2025-02-01
    “…We show that using only two random phase layers is sufficient for producing output optical signals with a white-noise profile, even for highly sparse input optical signals. …”
    Get full text
    Article