Search
Search Results
-
A hybrid encryption approach for efficient and secure data transmission in IoT devices
Security is a crucial concern in the Internet of Things (IoT) ecosystem. Due to IoT devices' constrained processing and storage resources, providing...
-
An algebraic and chaotic three-layered digital data encryption technique
This article introduces an encryption scheme for any digital data. The introduced encryption scheme is primarily based on three layers: substitution,...
-
Big data security and privacy protection model based on image encryption algorithm
The popularity of machine learning, AI and the network has greatly facilitated life, but there are also many security risks, and users’ privacy data...
-
RETRACTED ARTICLE: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption
Personalized medical data privacy and secure storage protection face serious challenges, especially in terms of data security and storage efficiency....
-
HIDDEn: Robust Data Hiding for Medical Images with Encryption and Local Binary Pattern
The secure transmission of medical images and related digital patient records on untrusted channels has recently become a focus in healthcare...
-
MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system
Cloud computing (CC) is a rapidly growing technology that is deployed by various organizations due to the high level of scalability, elasticity, and...
-
Network Information Security Data Protection Based on Data Encryption Technology
Data encryption technology can protect data from illegal theft. This study analyzed the Rivest, Shamir, and Adleman (RSA) algorithm, the Advanced...
-
Flexible symmetric predicate encryption for data privacy in IoT environments
Internet of Things (IoT) applications are revolutionizing lifestyles and social management. In IoT environments, there is a need to deploy a large...
-
Role-based access using partial homomorphic encryption for securing cloud data
Cloud computing has encountered accelerated growth and technological advancements in recent times. However, Cloud computing is still perceived to be...
-
An Encryption Transmission System for High-speed Private Data Streams in Online Education in the Specialty of “Traffic Engineering”
With the development of information technology, the high-speed private data stream encryption transmission system is more and more widely used in the...
-
An Advance Encryption and Attack Detection Framework for Securing Smart Cities Data in Blockchain Using Deep Learning Approach
Recently there has been a notable increase in interest in Internet of Things (IoT)-based smart cities from both business and academia. Smart cities...
-
Data encryption technology application in enterprise cost operation management based on cloud computing
As a new type of calculation method, 5G cloud computing provides convenient and fast service items for enterprises and ordinary users with its...
-
Privacy-Preserving of Digital 6G IoT Based Cyber Phycical System in Medical Big-Data Application Using Homomorphic Encryption
This abstract introduces a novel approach to privacy protection in cyber-physical systems built on the 6G Internet of Things (IoT), with an emphasis...
-
Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
Through the use of Ethereum, a framework is designed to simplify data exchange mechanism, improve food traceability, and improve privacy. A supply...
-
Bilateral hashing model of ECG signal encryption system using downhill peak follow (DPF)-based encryption technique
This research suggests a unique ECG security solution based on the data pattern-based encryption paradigm to address security issues in ECG signal...
-
An Adaptive Lightweight Hybrid Encryption Scheme for Securing the Healthcare Data in Cloud-Assisted Internet of Things
The revolution of IoT systems surpasses daily human facilities for providing financial, mechanical and social aspects. However, the secure...
-
A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme
With the rapid progress of network information technologies, security in medical data transmission has emerged as a popular research topic....
-
Cloud Data Security Using Hybrid Encryption with Blockchain
Securing cloud computing is a significant challenge for the cloud services sector. If someone is using the cloud to store data, choosing an... -
An Encryption Scheme Based on Grain Stream Cipher and Chaos for Privacy Protection of Image Data on IoT Network
IoT-enabled devices can collect information and act based on instructions over the Internet; they can sometimes communicate device to device. The IoT...
-
Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search
Public key encryption with keyword search (PEKS) has long been a promising way for secure data validation, which tells one whether the coming entry...