Showing 121 - 140 results of 187 for search 'optimal encryption algorithm', query time: 0.09s Refine Results
  1. 121

    Secure cloud computing: leveraging GNN and leader K-means for intrusion detection optimization by Raman Dugyala, Premkumar Chithaluru, M. Ramchander, Sunil Kumar, Arvind Yadav, N. Sudhakar Yadav, Diaa Salama Abd Elminaam, Deema Mohammed Alsekait

    Published 2024-12-01
    “…Additionally, the study introduces an optimized Grasshopper Optimization algorithm, which enhances the performance of the Optimal Neural Network, further refining detection accuracy. …”
    Get full text
    Article
  2. 122

    Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution by Don Roosan, Rubayat Khan, Saif Nirzhor, Fahmida Hai

    Published 2025-05-01
    “…Future studies should explore additional optimizations, homomorphic encryption, and larger-scale pilots under regulatory standards.…”
    Get full text
    Article
  3. 123

    Optimal path selection and secured data transmission in underwater acoustic sensor networks: LSTM-based energy prediction. by Sathish Kaveripakam, Ravikumar Chinthaginjala

    Published 2023-01-01
    “…Further, the data is transmitted via the optimal path securely by encrypting the data with the proposed improved blowfish algorithm (IBFA). …”
    Get full text
    Article
  4. 124

    Mitigating Transmission Errors: A Forward Error Correction-Based Framework for Enhancing Objective Video Quality by Muhammad Babar Imtiaz, Rabia Kamran

    Published 2025-06-01
    “…This is achieved by combining H.264/AVC syntax-based encryption and decryption algorithms with error correction during the video coding process to provide end-to-end confidentiality. …”
    Get full text
    Article
  5. 125

    A hybrid PKI and spiking neural network approach for enhancing security and energy efficiency in IoMT-based healthcare 5.0 by Dipalee D․Rane Chaudhari, Manisha S. Bhende, Aadam Quraishi, Azzah AlGhamdi, Ismail Keshta, Mukesh Soni, Brajesh Kumar Singh, Haewon Byeon, Mohammad Shabaz

    Published 2025-06-01
    “…Thus, a novel security framework is proposed in this work, in which a Public Key Infrastructure- Energy-Efficient Routing Protocol (PKI-EERP) with a Zebra Optimization Algorithm (ZOA) is incorporated in spiking neural networks. …”
    Get full text
    Article
  6. 126

    GuardianML: Anatomy of Privacy-Preserving Machine Learning Techniques and Frameworks by Nges Brian Njungle, Eric Jahns, Zhenqi Wu, Luigi Mastromauro, Milan Stojkov, Michel A. Kinsy

    Published 2025-01-01
    “…GuardianML filters potential frameworks based on user-defined criteria, such as the number of parties involved in multi-party computation or the need to minimize communication costs in homomorphic encryption scenarios. The system’s recommendations and optimizations are formulated as a maximization problem using linear integer programming to identify the most suitable solution for various use cases. …”
    Get full text
    Article
  7. 127

    A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms by Yangbo Chen, Wei Ou, Mengxue Pang, Jianqiang Ma, Qiuling Yue, Wenbao Han

    Published 2025-04-01
    “…To further enhance operational efficiency, the system incorporates performance optimization strategies such as batch processing and incremental synchronization. …”
    Get full text
    Article
  8. 128

    Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution by Nawal Shaltout, Ahmed A.Abd El-Latif, Waleed M. Al-Adrousy, Samir Elmougy

    Published 2023-01-01
    “…The proposed encryption method depends mainly on four steps: sequence generation, diffusion, confusion, and optimization. …”
    Get full text
    Article
  9. 129

    A Framework for Generating S-Box Circuits with Boyer–Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin by Yongjin Jeon, Seungjun Baek, Giyoon Kim, Jongsung Kim

    Published 2024-12-01
    “…The gate count in the cipher and the circuit depth must be low to minimize these two metrics. Many optimization strategies have been developed for the linear layer, led by the Boyer–Peralta (BP) algorithm. …”
    Get full text
    Article
  10. 130

    Optimizing Energy Efficiency in Vehicular Edge-Cloud Networks Through Deep Reinforcement Learning-Based Computation Offloading by Ibrahim A. Elgendy, Ammar Muthanna, Abdullah Alshahrani, Dina S. M. Hassan, Reem Alkanhel, Mohamed Elkawkagy

    Published 2024-01-01
    “…Given the complexity of this problem in large-scale vehicular networks, the study formulates an equivalent reinforcement learning model and employs a deep learning algorithm to derive optimal solutions. Simulation results conclusively demonstrate that the proposed model significantly outperforms existing benchmark techniques in terms of energy savings.…”
    Get full text
    Article
  11. 131

    DNS over HTTPS Tunneling Detection System Based on Selected Features via Ant Colony Optimization by Hardi Sabah Talabani, Zrar Khalid Abdul, Hardi Mohammed Mohammed Saleh

    Published 2025-05-01
    “…Ant Colony Optimization (ACO) is integrated with machine learning algorithms such as XGBoost, K-Nearest Neighbors (KNN), Random Forest (RF), and Convolutional Neural Networks (CNNs) using CIRA-CIC-DoHBrw-2020 as the benchmark dataset. …”
    Get full text
    Article
  12. 132
  13. 133

    A Novel QR Code–Based Solution for Secure Electronic Health Record Transfer in Venous Thromboembolism Home Rehabilitation Management: Algorithm Development and Validation by Changzhen Li, Zhigeng Jin, Fei Wang, Zheqi Zhang, Binbin Liu, Yutao Guo

    Published 2025-08-01
    “…It uses BPE, Avro, and Gzip for optimized data compression and uses ChaCha20 and BLAKE3 for encryption and authentication. …”
    Get full text
    Article
  14. 134

    Verifiable secure image retrieval for cloud-assisted IoT environments by GUO Jiaqi, MA Zhi, WANG Wensheng, TIAN Cong, DUAN Zhenhua

    Published 2025-03-01
    “…A matrix-based approach was employed for indexing and querying, and the feature matrix was encrypted using an enhanced secure k-nearest neighbor (kNN) algorithm based on the learning with errors (LWE), ensuring improved security in indexing and querying. …”
    Get full text
    Article
  15. 135

    Deep Reinforcement Learning-Enabled Computation Offloading: A Novel Framework to Energy Optimization and Security-Aware in Vehicular Edge-Cloud Computing Networks by Waleed Almuseelem

    Published 2025-03-01
    “…Then a deep learning-based algorithm is designed to learn close-optimal offloading solutions under dynamic conditions. …”
    Get full text
    Article
  16. 136

    Pilot-Based Codebook Non-Orthogonal Artificial Noise Schemes for Physical Layer Security: Secrecy Capacity Optimization Under Unknown Eavesdropper Channels by Yi Zhang, Yebo Gu, Tao Zhao, Bo Wang

    Published 2024-01-01
    “…It uses the successive convex approximation algorithm to analyze the optimal power allocation strategy and the maximum number of eavesdropper antennas that the system can tolerate under these conditions. …”
    Get full text
    Article
  17. 137

    Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods by Ahmet Emre Ergun, Ozgu Can, Murat Kantarcioglu

    Published 2025-01-01
    “…As a defense mechanism, DP is applied using the Fourier Perturbation Algorithm (FPA) to optimize padding strategies while maintaining network efficiency. …”
    Get full text
    Article
  18. 138

    An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine by Yishan Wu, Mengxue Pang, Jianqiang Ma, Wei Ou, Qiuling Yue, Wenbao Han

    Published 2025-03-01
    “…By integrating ShangMi cryptographic algorithms and blockchain, it optimizes performance, achieving 35% lower communication overhead than previous protocols. …”
    Get full text
    Article
  19. 139
  20. 140

    Secure Quantum Communication With Multi-Users in Quantum Networks by As'Ad Mahmoud As'Ad Alnaser, Hazem Moh'D Said Hatamleh, Nawaf Abdualziz Almolhis, Salahaldeen Duraibi, Yahya Alqahtani

    Published 2025-01-01
    “…Quantum Key Distribution (QKD) and encryption protocols are central to secure user-to-user communication in quantum networks. …”
    Get full text
    Article