Showing 1 - 20 results of 30 for search 'across encryption and decryption', query time: 0.08s Refine Results
  1. 1
  2. 2

    The A New Strategy to Enhance the Security of GPS Location by PGP Algorithm in Smart Containers by Mehrunnisa Saleem jan, Salman Ahmed, Safdar Nawaz Khan Marwat

    Published 2022-06-01
    “…The encrypted GPS location is sent across any communication channel. …”
    Get full text
    Article
  3. 3

    A HYBRID ELLIPTIC CURVE AND DATA ENCRYPTION STANDARD ALGORITHM FOR SECURE DATA COMMUNICATION by Samuel N. John, Etinosa Noma-Osaghae, Danjuma Sunday Shadrach, Adati Elkanah Chahari, Chiroma Libra Wamdeo, Ime Ukeme Udioko

    Published 2024-10-01
    “…The methodology involves first encrypting data using DES and subsequently applying ECC to the DES-encrypted output, thus providing a dual-layer encryption mechanism. …”
    Get full text
    Article
  4. 4

    Cloud Data Security through BB84 Protocol and Genetic Algorithm by Jaydip Kumar, Vipin Saxena

    Published 2022-12-01
    “…Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. …”
    Get full text
    Article
  5. 5

    Optimized Hybrid Central Processing Unit–Graphics Processing Unit Workflow for Accelerating Advanced Encryption Standard Encryption: Performance Evaluation and Computational Modeli... by Min Kyu Yang, Jae-Seung Jeong

    Published 2025-04-01
    “…This study addresses the growing demand for scalable data encryption by evaluating the performance of AES (Advanced Encryption Standard) encryption and decryption using CBC (Cipher Block Chaining) and CTR (Counter Mode) modes across various CPU (Central Processing Unit) and GPU (Graphics Processing Unit) hardware models. …”
    Get full text
    Article
  6. 6

    Analyzing cryptographic algorithm efficiency with in graph-based encryption models by Yashmin Banu, Biplab Kumar Rath, Debasis Gountia

    Published 2025-07-01
    “…Accordingly, the evaluation of the encryption algorithms was conducted using criteria such as encryption time, decryption time, and throughput to determine their relative performance. …”
    Get full text
    Article
  7. 7

    Privacy-preserving method for face recognition based on homomorphic encryption. by Zhigang Song, Gong Wang, Wenqin Yang, Yunliang Li, Yinsheng Yu, Zeli Wang, Xianghan Zheng, Yang Yang

    Published 2025-01-01
    “…The framework first utilizes a pre-trained model to extract facial feature templates, which are then encrypted. The encrypted templates are matched using Euclidean distance, with the final recognition being performed after decryption. …”
    Get full text
    Article
  8. 8

    Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication by U. Sumalatha, K. Krishna Prakasha, Srikanth Prabhu, Vinod C. Nayak

    Published 2025-01-01
    “…The CNN classifies encrypted features without decryption, ensuring secure authentication. …”
    Get full text
    Article
  9. 9

    A robust approach to satellite image encryption using chaotic map and circulant matrices by Shamsa Kanwal, Saba Inam, Asghar Ali Shah, Halima Iqbal, Anas Bilal, Muhammad Usman Hashmi, Raheem Sarwar

    Published 2024-12-01
    “…These findings verify the scheme's ability to come across the most stringent encryption and decryption standards, making it an effective solution for securing sensitive satellite image data.…”
    Get full text
    Article
  10. 10

    Secure and Scalable File Encryption for Cloud Systems via Distributed Integration of Quantum and Classical Cryptography by Changjong Kim, Seunghwan Kim, Kiwook Sohn, Yongseok Son, Manish Kumar, Sunggon Kim

    Published 2025-07-01
    “…The master node performs centralized decryption by collecting encrypted subsets, recovering the AES key, and executing decryption in parallel. …”
    Get full text
    Article
  11. 11

    Hybrid Cryptographic End-to-End Encryption Method for Protecting IoT Devices Against MitM Attacks by N. Karmous, M. Hizem, Y. Ben Dhiab, M. Ould-Elhassen Aoueileyine, R. Bouallegue, N. Youssef

    Published 2024-12-01
    “…End-to-End Encryption (E2EE) plays an essential role in safeguarding user privacy and protecting sensitive data across various communication platforms, including messaging applications, email services, and Internet of Things (IoT) devices. …”
    Get full text
    Article
  12. 12

    A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing by Priyanka Rajan Kumar, Sonia Goel

    Published 2025-04-01
    “…The effectiveness of the proposed system has been validated through a comprehensive set of experiments, including evaluations of Encryption Time, Decryption Time, Encryption Throughput, Decryption Throughput, and Histogram Analysis. …”
    Get full text
    Article
  13. 13

    HP_FLAP: homomorphic and polymorphic federated learning aggregation of parameters framework by Mohammad Moshawrab, Mehdi Adda, Abdenour Bouzouane, Hussein Ibrahim, Ali Raad

    Published 2025-06-01
    “…Homomorphic encryption allows the server to perform aggregation on encrypted parameters without decrypting them, ensuring that sensitive information is protected during the aggregation process. …”
    Get full text
    Article
  14. 14

    A Machine Learning-Based Ransomware Detection Method for Attackers’ Neutralization Techniques Using Format-Preserving Encryption by Jaehyuk Lee, Jinwook Kim, Hanjo Jeong, Kyungroul Lee

    Published 2025-04-01
    “…Ransomware, a type of malware that first appeared in 1989, encrypts user files and demands money for decryption, causing increasing global damage. …”
    Get full text
    Article
  15. 15

    Data protection enhancement in smart grid communication: An efficient multi-layer encrypting approach based on chaotic techniques and steganography by Osama abd Qasim, Sajjad Golshannavaz

    Published 2024-12-01
    “…In this way, AES encryption suggests rapid processing with a short average time per each block; similarly, the decryption technique, which includes the dictionary and AES decryption also renders the results in a justified computational time nominating it as a practical approach. …”
    Get full text
    Article
  16. 16

    SoK: FHE-Friendly Symmetric Ciphers and Transciphering by Chao Niu, Benqiang Wei, Zhicong Huang, Zhaomin Yang, Cheng Hong, Meiqin Wang, Tao Wei

    Published 2025-06-01
    “… Fully Homomorphic Encryption (FHE) enables computation on encrypted data without decryption, demonstrating significant potential for privacy-preserving applications. …”
    Get full text
    Article
  17. 17

    GPU Acceleration for FHEW/TFHE Bootstrapping by Yu Xiao, Feng-Hao Liu, Yu-Te Ku, Ming-Chien Ho, Chih-Fan Hsu, Ming-Ching Chang, Shih-Hao Hung, Wei-Chao Chen

    Published 2024-12-01
    “… Fully Homomorphic Encryption (FHE) allows computations to be performed directly on encrypted data without decryption. …”
    Get full text
    Article
  18. 18

    Facial Privacy Protection with Dynamic Multi-User Access Control for Online Photo Platforms by Andri Santoso, Samsul Huda, Yuta Kodera, Yasuyuki Nogami

    Published 2025-03-01
    “…The results demonstrate the system’s effectiveness across all test scenarios, consistently performing face encryption operations in under 350 ms and achieving average face decryption times below 286 ms across various group sizes. …”
    Get full text
    Article
  19. 19

    Mitigating Transmission Errors: A Forward Error Correction-Based Framework for Enhancing Objective Video Quality by Muhammad Babar Imtiaz, Rabia Kamran

    Published 2025-06-01
    “…This is achieved by combining H.264/AVC syntax-based encryption and decryption algorithms with error correction during the video coding process to provide end-to-end confidentiality. …”
    Get full text
    Article
  20. 20

    A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication by Babatunde Ojetunde, Takuya Kurihara, Kazuto Yano, Toshikazu Sakano, Hiroyuki Yokoyama

    Published 2025-06-01
    “…Therefore, PQC-based protocols with practical implementations across various applications are essential. This paper introduces a new framework for PQC standalone and PQC–AES (Advanced Encryption Standard) hybrid public-key encryption (PKE) protocols. …”
    Get full text
    Article