Showing 141 - 160 results of 187 for search 'optimal encryption algorithm', query time: 0.05s Refine Results
  1. 141

    TAQNet: Traffic-Aware Minimum-Cost Quantum Communication Network Planning by Ilora Maity, Junaid ur Rehman, Symeon Chatzinotas

    Published 2025-01-01
    “…In addition, we propose a genetic algorithm-based solution to optimally distribute the end-to-end QKD requests over the QCI. …”
    Get full text
    Article
  2. 142

    Ranking data privacy techniques in cloud computing based on Tamir’s complex fuzzy Schweizer-Sklar aggregation approach by Jabbar Ahmmad, Hamiden Abd El-Wahed Khalifa, Hafiz Muhammad Waqas, Alhanouf Alburaikan, Taha Radwan

    Published 2025-07-01
    “…The decision-making (DM) landscape in the case of cloud providers, therefore, is extremely complex because they would need to select the optimal approach among the very wide gamut of privacy techniques, which range from encryption to anonymization. …”
    Get full text
    Article
  3. 143

    SC-Route: A Scalable Cross-Layer Secure Routing Method for Multi-Hop Inter-Domain Wireless Networks by Yanbing Li, Yang Zhu, Shangpeng Wang

    Published 2025-05-01
    “…To address these limitations, we propose a new routing method—the Secure Cross-Layer Route—designed for multi-hop inter-domain wireless networks to achieve unified optimization of security, delay, and throughput. First, we construct a multi-objective optimization model that integrates authentication delay, link load, and resource states, enabling balanced trade-offs between security and transmission performance in dynamic conditions. …”
    Get full text
    Article
  4. 144

    Study on the parameters of the matrix NTRU cryptosystem by LI Zichen, WU Qinghao, SONG Jiashuo, PENG Haipeng

    Published 2025-03-01
    “…Finally, the efficiency of the improved matrix NTRU was further verified by experiments, and the encryption and decryption speeds were consistent with the theoretical analysis.ConclusionsThe result indicated that the matrix NTRU algorithmoptimized with adjusted parameters, possessed characteristics such as accurate encryption and decryption, as well as high efficiency.…”
    Get full text
    Article
  5. 145

    Analysis on Aigis‐Enc: Asymmetrical and symmetrical by Yupu Hu, Siyue Dong, Xingting Dong

    Published 2021-03-01
    “…Abstract Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). …”
    Get full text
    Article
  6. 146

    A high performance approach to ensure image security during transmission by Adithya S Nair, Charvi Upreti, Advaith Arun, Renuka Devi S

    Published 2025-09-01
    “…The approach uses RGB plane bit values with a matrix-based encryption scheme, implemented as a symmetric key algorithm. …”
    Get full text
    Article
  7. 147

    M-folding method–based elliptic curve cryptosystem for industrial cyber-physical system by Taehoon Do, Seungwoo Park, Jaehwan Lee, Sangoh Park

    Published 2019-10-01
    “…This study applies the m-folding method to the highly secure elliptic curve algorithm to improve efficiency and proposes the cryptosystem optimized for the resource-constrained industrial cyber-physical system. …”
    Get full text
    Article
  8. 148

    Generalized Fractional Order Complex Lorenz System-Based Dual Layer Security Enhancement Approach by K. Meera, N. Selvaganesan

    Published 2025-01-01
    “…In this paper, the fractional order complex Lorenz system is considered and system parameters are optimized using sequential quadratic programming algorithm by considering a multi objective function. …”
    Get full text
    Article
  9. 149

    Application of Quantum Key Distribution to Enhance Data Security in Agrotechnical Monitoring Systems Using UAVs by Makhabbat Bakyt, Luigi La Spada, Nida Zeeshan, Khuralay Moldamurat, Sabyrzhan Atanov

    Published 2025-02-01
    “…This study proposes the integration of Quantum Key Distribution (QKD), based on the BB84 protocol, as a secure key management mechanism to enhance data security in UAV-based geographic information systems (GIS) for monitoring agricultural fields and forest fires. QKD is not an encryption algorithm but a secure key distribution protocol that provides information-theoretic security by leveraging the principles of quantum mechanics. …”
    Get full text
    Article
  10. 150

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  11. 151

    Enabling Power Systems With SQKD in Presence of Remote Nodes by Mariam Gado, Muhammad Ismail

    Published 2025-01-01
    “…Due to the complexity of the allocation problem, this paper develops algorithms based on Density-Based Spatial Clustering of Applications with Noise algorithm (DBSCAN), Dijksra’s algorithm and genetic algorithms. …”
    Get full text
    Article
  12. 152

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  13. 153

    A Low-Cost PKC-Based RFID Mutual Authentication Protocol by Lili Wei, Qingkuan Dong, Wenxiu Ding

    Published 2013-10-01
    “…Based on the PKC-based RFID authentication protocol cryptoGPS which costs the least resource currently,a low-cost mutual authentication protocol which has a flexible key-management and can realize a mutual authentication was proposed.It adopted a new key-management scheme,an optimized fast Rabin encryption algorithm,low Hamming weight modulus and a lightweight stream cipher algorithm Grain V1,moreover,a new low-cost multiplier was designed to achieve the modulus multiplication on large numbers.The security analysis and simulation experiments carried out on Design Complier with Smic 0.25 μm technique show that this scheme is secure enough and in which the tag just needs 4 530 gates,it is suitable for RFID system.…”
    Get full text
    Article
  14. 154

    Implementation of Personal Health Device Communication Protocol Applying ISO/IEEE 11073-20601 by Deok Seok Seo, Soon Seok Kim, Yong Hee Lee, Jong Mo Kim

    Published 2014-05-01
    “…Moreover, security is enhanced by applying the international symmetric key encryption standard, advanced encryption standard (AES), for secure data transmission from the weight sensor to gateway. …”
    Get full text
    Article
  15. 155

    Federated learning for digital twin applications: a privacy-preserving and low-latency approach by Jie Li, Dong Wang

    Published 2025-08-01
    “…To address these security and privacy threats, this paper proposes the FL-FedDT scheme—a privacy-preserving and low-latency FL method that employs an enhanced Paillier homomorphic encryption algorithm to safeguard the privacy of local device parameters without transmitting data to the server. …”
    Get full text
    Article
  16. 156

    Research on Modeling and Dynamic Characteristics of Complex Biological Neural Network Model considering BP Neural Network Method by Hongyan Chen

    Published 2021-01-01
    “…The BP neural network algorithm can be used to solve more complex dynamic behaviors and can optimize the global search. …”
    Get full text
    Article
  17. 157

    Integrated Protocols to Ensure Security Services in Wireless Sensor Networks by Mohammed Faisal, Jalal Al-Muhtadi, Abdullah Al-Dhelaan

    Published 2013-07-01
    “…The proposed protocols integrate public key and symmetric key algorithms to ensure optimal usage of sensors' energy and processing power to provide adequate security in next generation WSN. …”
    Get full text
    Article
  18. 158

    Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0 by Mohammed El-Hajj, Teklit Haftu Gebremariam

    Published 2024-07-01
    “…Addressing this, this study introduces the ASCON algorithm for lightweight authenticated encryption with associated data, enhancing confidentiality, integrity, and authenticity within IoT limitations. …”
    Get full text
    Article
  19. 159

    Adaptive Dynamic Programming-Based Intelligent Finite-Time Flexible SMC for Stabilizing Fractional-Order Four-Wing Chaotic Systems by Mai The Vu, Seong Han Kim, Duc Hung Pham, Ha Le Nhu Ngoc Thanh, Van Huy Pham, Majid Roohi

    Published 2025-06-01
    “…The control strategy eliminates the need for explicit system models by exploiting the norm-bounded characteristics of chaotic system states. To optimize the parameters of the model-free FTF-SMC, a deep reinforcement learning framework based on the adaptive dynamic programming (ADP) algorithm is employed. …”
    Get full text
    Article
  20. 160

    Secure healthcare data sharing and attack detection framework using radial basis neural network by Abhishek Kumar, Priya Batta, Pramod Singh Rathore, Sachin Ahuja

    Published 2025-05-01
    “…The proposed authenticate access control mechanism (PA2C) safeguards data integrity as well as the security and dependability of EHR data sharing are improved by the use of smart contracts, encryption, and secure key management. On the other hand, the proposed intelligent voyage optimization algorithm-based Radial basis neural network (IntVO-RBNN) effectively detects the attacks in the network. …”
    Get full text
    Article