Showing 21 - 30 results of 30 for search 'across encryption and decryption', query time: 0.06s Refine Results
  1. 21

    Intelligent two-phase dual authentication framework for Internet of Medical Things by Muhammad Asif, Mohammad Abrar, Abdu Salam, Farhan Amin, Faizan Ullah, Sabir Shah, Hussain AlSalman

    Published 2025-01-01
    “…The results show that encryption/decryption time is reduced by over 45%, overall computational cost by 45.38%, and latency by 28.42% over existing approaches. …”
    Get full text
    Article
  2. 22

    User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment by Tarun Kumar, Prabhat Kumar, Suyel Namasudra

    Published 2025-01-01
    “…Advanced encryption and decryption techniques in cloud computing environments can be considered useful to achieve this aspect. …”
    Get full text
    Article
  3. 23

    A Novel Method of Data Protection Through DNA Chromosome Databases by Sadoon Hussein, Ahmed Sami

    Published 2025-01-01
    “…The paper also presented several findings, including a low encryption time of 250 ms and decryption time of 230 ms, as well as a memory usage of 50 MB for large datasets. …”
    Get full text
    Article
  4. 24

    A secure healthcare data transmission based on synchronization of fractional order chaotic systems by Nur Afiqah Suzelan Amir, Fatin Nabila Abd Latiff, Kok Bin Wong, Wan Ainun Mior Othman

    Published 2025-02-01
    “…The synchronization between the primary system (PS) and the secondary system (SS) is achieved through the application of Lyapunov stability theory. For the encryption and decryption of sensitive healthcare data, the scheme employs the n-shift encryption principle. …”
    Get full text
    Article
  5. 25

    SSL-XIoMT: Secure, Scalable, and Lightweight Cross-Domain IoMT Sharing With SSI and ZKP Authentication by Lyhour Hak, Somchart Fugkeaw

    Published 2025-01-01
    “…Our extensive analysis shows that SSL-XIoMT dramatically improves the performance of processing time for CP-ABE encryption and decryption compared to current methods. …”
    Get full text
    Article
  6. 26

    Enhancing Image Cryptography Performance with Block Left Rotation Operations by Mohammad Subhi Al-Batah, Mowafaq Salem Alzboon, Mazen Alzyoud, Najah Al-Shanableh

    Published 2024-01-01
    “…At the core of this method lies the utilization of a sophisticated variable content private key designed to facilitate ease of alteration without compromising the integrity of encryption and decryption operations. The pivotal aspect involves leveraging a covert color image to generate this private key, mandating both the sender and receiver to securely retain this image. …”
    Get full text
    Article
  7. 27

    Federated stochastic gradient averaging ring homomorphism based learning for secure data aggregation in WSN by Saravanakumar Pichumani, T. V. P. Sundararajan, S. M. Ramesh

    Published 2025-05-01
    “…Following which secure data aggregation is performed using Ring Homomorphism-based encryption/decryption. The proposed FSGARH-L method is analyzed theoretically and simulated from several viewpoints. …”
    Get full text
    Article
  8. 28

    TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT by Jiamin Hu, Zhonghua Shen, Kefei Chen, Yuying Liu, Qian Meng, Fuqun Wang, Yong Liu

    Published 2024-01-01
    “…By implementing searchable encryption techniques, the data receiver can generate trapdoors to search and retrieve specific encrypted data without the need to decrypt the entire dataset. …”
    Get full text
    Article
  9. 29

    Practical Opcode-based Fault Attack on AES-NI by Xue Gong, Xin Zhang, Qianmei Wu, Fan Zhang, Junge Xu, Qingni Shen, Zhi Zhang

    Published 2025-06-01
    “… AES New Instructions (AES-NI) is a set of hardware instructions introduced by Intel to accelerate AES encryption and decryption, significantly improving efficiency across various cryptographic applications. …”
    Get full text
    Article
  10. 30

    Digital Certificate-Based Authentication Model for Enhanced Smartphone Security by A. H. Azni, Sakiinah Altaf Hussain, Najwa Hayaati Mohd Alwi

    Published 2025-03-01
    “…Expert reviews agree that the model effectively mitigates unauthorized access risks by strengthening encryption and authentication protocols across its three key phases. …”
    Get full text
    Article