Search
Search Results
-
IRIS Image Encryption and Decryption Based Application Using Chaos System and Confusion Technique
In today’s era, Digital Image Security is of primary importance and is receiving a huge amount of consideration. Because digital photographs are used... -
CryptoDataMR: Enhancing the Data Protection Using Cryptographic Hash and Encryption/Decryption Through MapReduce Programming Model
Cloud computing has become the most significant technology in today’s world as it provides several services including physical resources and... -
VEDSDA: Voronoi Encryption and Decryption for Secure Data Aggregation in WSNs
The various application in Wireless Sensor Networks fascinated towards minimal and secure data transmission. In this paper, VEDSDA protocol is...
-
Machine Learning-Based Technique for Phishing URLs Detection from TLS 1.2 and TLS 1.3 Traffic Without Decryption
Phishing is one of the major leading cyberattack leading to huge financial loss and sensitive information loss such as account information, card... -
Secure mobile health system supporting search function and decryption verification
In order to protect the privacy of the data, the data owners encrypt their sensitive data before transferring it to cloud servers. This method leads...
-
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation
Attribute based encryption is an effective method which can solve the access control problem of cloud storage. Realizing both efficient attributes...
-
The Role of Image Encryption and Decryption in Secure Communication: A Survey
Information security is a vital tool for protecting the confidentiality and integrity of digital information. In this paper, we consider different... -
An ECC-based access control scheme with lightweight decryption and conditional authentication for data sharing in vehicular networks
Nowadays, more and more data are stored on cloud for sharing in vehicular networks, but the increasing number of cloud data security incidents makes...
-
Encryption and Decryption of Image for Secured Data Transmission
This work combines Arnold transform method with the spatial domain to encrypt a covered image and also recovers the covered image by the application... -
Identity Based Broadcast Encryption Scheme with Shorter Decryption Keys for Open Networks
In Broadcast Encryption schemes, a sender can broadcast the encrypted message securely in a threatening network to a set of legitimate system users...
-
AES-Based Android Video Encryption and Decryption App
Encryption is a major requirement in today’s world as it boosts the security of the data that everyone shares all over the Internet. Videos are the... -
A Novel Approach for AES Encryption–Decryption Using AngularJS
The goal of this paper is to implement a simple encryption–decryption web application that utilizes the facility provided by AngularJS. The advanced... -
Implementation of Four-Pass Protocol Scheme Using Mathematical Series Cipher Encryption and Decryption in a Communication Network
Security features come into play when it is compulsory or enviable to defend the information communication from an opponent who attempts to break the... -
MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system
Cloud computing (CC) is a rapidly growing technology that is deployed by various organizations due to the high level of scalability, elasticity, and...
-
Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow
Attribute-based encryption (ABE) can achieve data confidentiality as well as fine-grained access control of encrypted data in data outsourcing...
-
End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES–RSA) Cryptography
In wireless sensor networks, ensuring data confidentiality and integrity is paramount, particularly in sensitive environments. However, existing...
-
Large File Security Outsourcing and Sharing Method Based on Blockchain
With the development of the big data era, the amount of data has entered an explosive growth phase. Limited by the constraints of cost, efficiency,...
-
Colored Image Encryption and Decryption with a New Algorithm and a Hyperchaotic Electrical Circuit
In the present work, an encryption/decryption technique, using a new bit-level scrambling and a new diffusion algorithm is presented. The proposed...
-
Analysis of Malicious DoS Attacks in AES-128 Decryption Module
AES is the most widely accepted standard in cryptography as it is considered to be the most secure and safest cryptographic algorithm. But in today’s... -
Secured Data Encryption and Decryption for Transmission in Device Independent Systems
In general, a company will have its branches at different locations and every branch will have different hardware and software configurations....