-
141
TAQNet: Traffic-Aware Minimum-Cost Quantum Communication Network Planning
Published 2025-01-01“…In addition, we propose a genetic algorithm-based solution to optimally distribute the end-to-end QKD requests over the QCI. …”
Get full text
Article -
142
Ranking data privacy techniques in cloud computing based on Tamir’s complex fuzzy Schweizer-Sklar aggregation approach
Published 2025-07-01“…The decision-making (DM) landscape in the case of cloud providers, therefore, is extremely complex because they would need to select the optimal approach among the very wide gamut of privacy techniques, which range from encryption to anonymization. …”
Get full text
Article -
143
SC-Route: A Scalable Cross-Layer Secure Routing Method for Multi-Hop Inter-Domain Wireless Networks
Published 2025-05-01“…To address these limitations, we propose a new routing method—the Secure Cross-Layer Route—designed for multi-hop inter-domain wireless networks to achieve unified optimization of security, delay, and throughput. First, we construct a multi-objective optimization model that integrates authentication delay, link load, and resource states, enabling balanced trade-offs between security and transmission performance in dynamic conditions. …”
Get full text
Article -
144
Study on the parameters of the matrix NTRU cryptosystem
Published 2025-03-01“…Finally, the efficiency of the improved matrix NTRU was further verified by experiments, and the encryption and decryption speeds were consistent with the theoretical analysis.ConclusionsThe result indicated that the matrix NTRU algorithm, optimized with adjusted parameters, possessed characteristics such as accurate encryption and decryption, as well as high efficiency.…”
Get full text
Article -
145
Analysis on Aigis‐Enc: Asymmetrical and symmetrical
Published 2021-03-01“…Abstract Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). …”
Get full text
Article -
146
A high performance approach to ensure image security during transmission
Published 2025-09-01“…The approach uses RGB plane bit values with a matrix-based encryption scheme, implemented as a symmetric key algorithm. …”
Get full text
Article -
147
M-folding method–based elliptic curve cryptosystem for industrial cyber-physical system
Published 2019-10-01“…This study applies the m-folding method to the highly secure elliptic curve algorithm to improve efficiency and proposes the cryptosystem optimized for the resource-constrained industrial cyber-physical system. …”
Get full text
Article -
148
Generalized Fractional Order Complex Lorenz System-Based Dual Layer Security Enhancement Approach
Published 2025-01-01“…In this paper, the fractional order complex Lorenz system is considered and system parameters are optimized using sequential quadratic programming algorithm by considering a multi objective function. …”
Get full text
Article -
149
Application of Quantum Key Distribution to Enhance Data Security in Agrotechnical Monitoring Systems Using UAVs
Published 2025-02-01“…This study proposes the integration of Quantum Key Distribution (QKD), based on the BB84 protocol, as a secure key management mechanism to enhance data security in UAV-based geographic information systems (GIS) for monitoring agricultural fields and forest fires. QKD is not an encryption algorithm but a secure key distribution protocol that provides information-theoretic security by leveraging the principles of quantum mechanics. …”
Get full text
Article -
150
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
151
Enabling Power Systems With SQKD in Presence of Remote Nodes
Published 2025-01-01“…Due to the complexity of the allocation problem, this paper develops algorithms based on Density-Based Spatial Clustering of Applications with Noise algorithm (DBSCAN), Dijksra’s algorithm and genetic algorithms. …”
Get full text
Article -
152
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
153
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01“…Based on the PKC-based RFID authentication protocol cryptoGPS which costs the least resource currently,a low-cost mutual authentication protocol which has a flexible key-management and can realize a mutual authentication was proposed.It adopted a new key-management scheme,an optimized fast Rabin encryption algorithm,low Hamming weight modulus and a lightweight stream cipher algorithm Grain V1,moreover,a new low-cost multiplier was designed to achieve the modulus multiplication on large numbers.The security analysis and simulation experiments carried out on Design Complier with Smic 0.25 μm technique show that this scheme is secure enough and in which the tag just needs 4 530 gates,it is suitable for RFID system.…”
Get full text
Article -
154
Implementation of Personal Health Device Communication Protocol Applying ISO/IEEE 11073-20601
Published 2014-05-01“…Moreover, security is enhanced by applying the international symmetric key encryption standard, advanced encryption standard (AES), for secure data transmission from the weight sensor to gateway. …”
Get full text
Article -
155
Federated learning for digital twin applications: a privacy-preserving and low-latency approach
Published 2025-08-01“…To address these security and privacy threats, this paper proposes the FL-FedDT scheme—a privacy-preserving and low-latency FL method that employs an enhanced Paillier homomorphic encryption algorithm to safeguard the privacy of local device parameters without transmitting data to the server. …”
Get full text
Article -
156
Research on Modeling and Dynamic Characteristics of Complex Biological Neural Network Model considering BP Neural Network Method
Published 2021-01-01“…The BP neural network algorithm can be used to solve more complex dynamic behaviors and can optimize the global search. …”
Get full text
Article -
157
Integrated Protocols to Ensure Security Services in Wireless Sensor Networks
Published 2013-07-01“…The proposed protocols integrate public key and symmetric key algorithms to ensure optimal usage of sensors' energy and processing power to provide adequate security in next generation WSN. …”
Get full text
Article -
158
Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0
Published 2024-07-01“…Addressing this, this study introduces the ASCON algorithm for lightweight authenticated encryption with associated data, enhancing confidentiality, integrity, and authenticity within IoT limitations. …”
Get full text
Article -
159
Adaptive Dynamic Programming-Based Intelligent Finite-Time Flexible SMC for Stabilizing Fractional-Order Four-Wing Chaotic Systems
Published 2025-06-01“…The control strategy eliminates the need for explicit system models by exploiting the norm-bounded characteristics of chaotic system states. To optimize the parameters of the model-free FTF-SMC, a deep reinforcement learning framework based on the adaptive dynamic programming (ADP) algorithm is employed. …”
Get full text
Article -
160
Secure healthcare data sharing and attack detection framework using radial basis neural network
Published 2025-05-01“…The proposed authenticate access control mechanism (PA2C) safeguards data integrity as well as the security and dependability of EHR data sharing are improved by the use of smart contracts, encryption, and secure key management. On the other hand, the proposed intelligent voyage optimization algorithm-based Radial basis neural network (IntVO-RBNN) effectively detects the attacks in the network. …”
Get full text
Article