We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 9,450 results
  1. IRIS Image Encryption and Decryption Based Application Using Chaos System and Confusion Technique

    In today’s era, Digital Image Security is of primary importance and is receiving a huge amount of consideration. Because digital photographs are used...
    K. Archana, Sharath Sashi Kumar, ... M. L. J. Shruthi in Modeling, Simulation and Optimization
    Conference paper 2022
  2. CryptoDataMR: Enhancing the Data Protection Using Cryptographic Hash and Encryption/Decryption Through MapReduce Programming Model

    Cloud computing has become the most significant technology in today’s world as it provides several services including physical resources and...
    Conference paper 2023
  3. VEDSDA: Voronoi Encryption and Decryption for Secure Data Aggregation in WSNs

    The various application in Wireless Sensor Networks fascinated towards minimal and secure data transmission. In this paper, VEDSDA protocol is...

    S. Reshma, K. Shaila, K. R. Venugopal in Wireless Personal Communications
    Article 27 May 2021
  4. Machine Learning-Based Technique for Phishing URLs Detection from TLS 1.2 and TLS 1.3 Traffic Without Decryption

    Phishing is one of the major leading cyberattack leading to huge financial loss and sensitive information loss such as account information, card...
    Munish Kumar, Alwyn Roshan Pais, Routhu Srinivasa Rao in Machine Intelligence Techniques for Data Analysis and Signal Processing
    Conference paper 2023
  5. Secure mobile health system supporting search function and decryption verification

    In order to protect the privacy of the data, the data owners encrypt their sensitive data before transferring it to cloud servers. This method leads...

    Nabeil Eltayieb, Rashad Elhabob, ... Fagen Li in Journal of Ambient Intelligence and Humanized Computing
    Article 22 July 2020
  6. A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation

    Attribute based encryption is an effective method which can solve the access control problem of cloud storage. Realizing both efficient attributes...

    Shuo Zhang, Wenmin Li, ... Zheng** ** in Wireless Personal Communications
    Article 17 June 2020
  7. The Role of Image Encryption and Decryption in Secure Communication: A Survey

    Information security is a vital tool for protecting the confidentiality and integrity of digital information. In this paper, we consider different...
    T. Devi Manjari, V. Pavan Surya Prakash, ... Barenya Bikash Hazarika in Advances in IoT and Security with Computational Intelligence
    Conference paper 2023
  8. An ECC-based access control scheme with lightweight decryption and conditional authentication for data sharing in vehicular networks

    Nowadays, more and more data are stored on cloud for sharing in vehicular networks, but the increasing number of cloud data security incidents makes...

    Xuanmei Qin, Yongfeng Huang, **ng Li in Soft Computing
    Article 30 June 2020
  9. Encryption and Decryption of Image for Secured Data Transmission

    This work combines Arnold transform method with the spatial domain to encrypt a covered image and also recovers the covered image by the application...
    C. Thirumarai Selvi, R. S. Sankarasubramanian, M. MuthuKrishnan in Futuristic Communication and Network Technologies
    Conference paper 2022
  10. Identity Based Broadcast Encryption Scheme with Shorter Decryption Keys for Open Networks

    In Broadcast Encryption schemes, a sender can broadcast the encrypted message securely in a threatening network to a set of legitimate system users...

    Pragya Mishra, Renuka, Vandani Verma in Wireless Personal Communications
    Article 17 June 2020
  11. AES-Based Android Video Encryption and Decryption App

    Encryption is a major requirement in today’s world as it boosts the security of the data that everyone shares all over the Internet. Videos are the...
    Conference paper 2021
  12. A Novel Approach for AES Encryption–Decryption Using AngularJS

    The goal of this paper is to implement a simple encryption–decryption web application that utilizes the facility provided by AngularJS. The advanced...
    Conference paper 2021
  13. Implementation of Four-Pass Protocol Scheme Using Mathematical Series Cipher Encryption and Decryption in a Communication Network

    Security features come into play when it is compulsory or enviable to defend the information communication from an opponent who attempts to break the...
    Conference paper 2022
  14. MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system

    Cloud computing (CC) is a rapidly growing technology that is deployed by various organizations due to the high level of scalability, elasticity, and...

    Anuradha M, Jean Justus J, Mary Immaculate Sheela L in Peer-to-Peer Networking and Applications
    Article 06 February 2024
  15. Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow

    Attribute-based encryption (ABE) can achieve data confidentiality as well as fine-grained access control of encrypted data in data outsourcing...

    Yan Zhou, Changgen Peng, ... Weijie Tan in Mobile Networks and Applications
    Article 11 March 2023
  16. End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES–RSA) Cryptography

    In wireless sensor networks, ensuring data confidentiality and integrity is paramount, particularly in sensitive environments. However, existing...

    V. Anusuya Devi, T. Sampradeepraj in Wireless Personal Communications
    Article 25 June 2024
  17. Large File Security Outsourcing and Sharing Method Based on Blockchain

    With the development of the big data era, the amount of data has entered an explosive growth phase. Limited by the constraints of cost, efficiency,...

    Xuan You, Changsong Zhou, ... Guozi Sun in Journal of Signal Processing Systems
    Article 05 June 2023
  18. Colored Image Encryption and Decryption with a New Algorithm and a Hyperchaotic Electrical Circuit

    In the present work, an encryption/decryption technique, using a new bit-level scrambling and a new diffusion algorithm is presented. The proposed...

    Batuhan Arpacı, Erol Kurt, ... Bünyamin Ciylan in Journal of Electrical Engineering & Technology
    Article 06 March 2020
  19. Analysis of Malicious DoS Attacks in AES-128 Decryption Module

    AES is the most widely accepted standard in cryptography as it is considered to be the most secure and safest cryptographic algorithm. But in today’s...
    Conference paper 2021
  20. Secured Data Encryption and Decryption for Transmission in Device Independent Systems

    In general, a company will have its branches at different locations and every branch will have different hardware and software configurations....
    B. N. Lakshmi Narayan, N. H. Prasad, A. Mariyan Richard in International Conference on Communication, Computing and Electronics Systems
    Conference paper 2021
Did you find what you were looking for? Share feedback.