We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 9,450 results
  1. Blockchain-Based Fair Payment for ABE with Outsourced Decryption

    Attribute-based encryption (ABE) is an advanced public-key encryption supporting fine-grained access control and flexible sharing of encrypted data....

    Linjian Hong, Kai Zhang, ... Haifeng Qian in Peer-to-Peer Networking and Applications
    Article 04 November 2022
  2. A reconfigurable and compact subpipelined architecture for AES encryption and decryption

    AES has been used in many applications to provide the data confidentiality. A new 32-bit reconfigurable and compact architecture for AES encryption...

    Ke Li, Hua Li, Graeme Mund in EURASIP Journal on Advances in Signal Processing
    Article Open access 09 January 2023
  3. A two-layer networks-based audio encryption/decryption scheme via fixed-time cluster synchronization

    In this paper, an audio encryption/decryption scheme based on the cluster synchronization of two-layer complex networks within fixed-time is...

    Lili Zhou, **aohui Li, ... Weina Ma in Soft Computing
    Article 22 July 2022
  4. Encryption/Decryption with Optical Transform

    In this chapter, the methods of image encryption and decryption based on optical transformation are introduced. The extended fractional Fourier...
    Zhengjun Liu, Yu Ji, ... Hang Chen in Recent Advanced in Image Security Technologies
    Chapter 2023
  5. Color Image Encryption and Decryption by Using Optical Scanning Cryptography Method

    In this paper, a computer simulation of optical encryption for color images are presented based on the optical scanning cryptography technique that...
    Mohamed J. Albermani, Eman M. Al-Hilo, Kawther H. Al-khafaji in Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems
    Conference paper 2023
  6. Secure and efficient multi-key FHE scheme supporting multi-bit messages from LWE preserving non-interactive decryption

    We consider multi-key fully homomorphic encryption (multi-key FHE) which is the richest variant of fully homomorphic encryption (FHE) that allows...

    Article 14 May 2022
  7. A New Algorithm for Encryption and Decryption Using AUM Block Sum Labeling

    The advantages of digital data are spreading throughout all industries in the modern world, and securing data while exchanging is extremely...
    Conference paper 2024
  8. All-Optical Encryption and Decryption Circuit

    In modern times, there is a huge demand for high speed communication and optical circuits can serve us the purpose very well. There have been many...
    Chapter 2022
  9. RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission

    Security is an essential task while focusing on confidential level of patient information during medical data transmission. The image encryption...

    M. N. Sharada Guptha, M. N. Eshwarappa in Wireless Personal Communications
    Article 24 February 2022
  10. An Advanced Encryption Standard in Memory (AESIM) Efficient, High Performance S-box Based AES Encryption and Decryption Architecture on VLSI

    As CMOS(Complementary Metal Oxide Semiconductor) technology reaches its scaling threshold, evolving non-volatile memory approaches are becoming a...

    R. Anusha Padmavathi, K. S. Dhanalakshmi in Wireless Personal Communications
    Article 29 October 2021
  11. FPGA hardware acceleration of an improved chaos-based cryptosystem for real-time image encryption and decryption

    This paper introduces a full **linx FPGA-Zynq implementation of a robust cryptosystem for real-time image encryption and decryption. Firstly, a...

    Mohamed Gafsi, Mohamed Ali Hajjaji, ... Abdellatif Mtibaa in Journal of Ambient Intelligence and Humanized Computing
    Article 28 October 2021
  12. Need of Hour: Hybrid Encryption and Decryption Standards (HEaDS) Algorithm for Data Security

    With the significant advancements in information technology, a massive amount of data is being shared over the internet. And over the previous few...
    Conference paper 2023
  13. Study on the Encryption and Decryption Capabilities of Hybrid Techniques for Images

    Data plays an important role in modern life, and because more and more gadgets are connecting to the internet, the amount of data stored online is...
    Nongmeikapam Thoiba Singh, Rahul Dayal, ... Aishwarya Bhardwaj in Intelligent Sustainable Systems
    Conference paper 2023
  14. Asymmetric DNA encryption and decryption technique for Arabic plaintext

    The security of transmitting information from one point to another through different media is an important issue in the modern digital society....

    Meshrif Alruily, Osama R. Shahin, ... Ahmed I. Taloba in Journal of Ambient Intelligence and Humanized Computing
    Article 10 April 2021
  15. Preventing Data Leakage by Trojans in Commercial and ASIC Applications Using TDM and DES Encryption and Decryption

    The purpose of this work is to provide a justification to the notion of reducing the leakage of data by the data leakage Trojans in the modulation...
    Shashank Kumar Pathak, M. Nirmala Devi in Advanced IoT Sensors, Networks and Systems
    Conference paper 2023
  16. Transmission and Decryption of the Audio Signal Masked with ECG by FDM Method

    Today, the use of these methods as hybrids has provided the motivation to be a solution to important problems, since the existing methods are...

    Article 04 July 2022
  17. Design of Heterogeneous Database Encryption and Decryption System Based on Data Mining

    The main idea behind this method is to build a model to describe the relationship between encrypted data and plaintext data, as well as the...
    Conference paper 2024
  18. A Partial Outsourcing Decryption of Attribute-Based Encryption for Internet of Things

    Internet of things (IoT) is a fast-growing technology in the modern digital era that attracts people from industries as well as academic fields. IoT...
    Conference paper 2022
  19. CryptoDataMR: Enhancing the Data Protection Using Cryptographic Hash and Encryption/Decryption Through MapReduce Programming Model

    Cloud computing has become the most significant technology in today’s world as it provides several services including physical resources and...
    Conference paper 2023
  20. Encryption and Decryption of Secure Data for Diverse Genomes

    In all respects, information management is the most important challenge in the present situation, since “DATA IS THE NEXT FUEL”. Data preservation is...
    Conference paper 2022
Did you find what you were looking for? Share feedback.