We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. A hybrid encryption approach for efficient and secure data transmission in IoT devices

    Security is a crucial concern in the Internet of Things (IoT) ecosystem. Due to IoT devices' constrained processing and storage resources, providing...

    Article Open access 20 June 2024
  2. An algebraic and chaotic three-layered digital data encryption technique

    This article introduces an encryption scheme for any digital data. The introduced encryption scheme is primarily based on three layers: substitution,...

    Saria Jahangir, Tariq Shah, A. Haj Ismail in Nonlinear Dynamics
    Article 29 August 2023
  3. Big data security and privacy protection model based on image encryption algorithm

    The popularity of machine learning, AI and the network has greatly facilitated life, but there are also many security risks, and users’ privacy data...

    Binjie Hua, Zhe Wang, ... RuiLi Qi in Soft Computing
    Article 07 June 2023
  4. RETRACTED ARTICLE: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption

    Personalized medical data privacy and secure storage protection face serious challenges, especially in terms of data security and storage efficiency....

    Article Open access 02 January 2024
  5. HIDDEn: Robust Data Hiding for Medical Images with Encryption and Local Binary Pattern

    The secure transmission of medical images and related digital patient records on untrusted channels has recently become a focus in healthcare...

    Priyanka, Naman Baranwal, ... A. K. Singh in Circuits, Systems, and Signal Processing
    Article 11 April 2024
  6. MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system

    Cloud computing (CC) is a rapidly growing technology that is deployed by various organizations due to the high level of scalability, elasticity, and...

    Anuradha M, Jean Justus J, Mary Immaculate Sheela L in Peer-to-Peer Networking and Applications
    Article 06 February 2024
  7. Network Information Security Data Protection Based on Data Encryption Technology

    Data encryption technology can protect data from illegal theft. This study analyzed the Rivest, Shamir, and Adleman (RSA) algorithm, the Advanced...

    Article 22 June 2022
  8. Flexible symmetric predicate encryption for data privacy in IoT environments

    Internet of Things (IoT) applications are revolutionizing lifestyles and social management. In IoT environments, there is a need to deploy a large...

    Qingquan Bian, Yue Zhang, ... Axin Wu in Peer-to-Peer Networking and Applications
    Article 11 January 2024
  9. Role-based access using partial homomorphic encryption for securing cloud data

    Cloud computing has encountered accelerated growth and technological advancements in recent times. However, Cloud computing is still perceived to be...

    Article 30 March 2023
  10. An Encryption Transmission System for High-speed Private Data Streams in Online Education in the Specialty of “Traffic Engineering”

    With the development of information technology, the high-speed private data stream encryption transmission system is more and more widely used in the...

    Hongbin Cao, Gautam Srivastava in Mobile Networks and Applications
    Article 01 June 2023
  11. An Advance Encryption and Attack Detection Framework for Securing Smart Cities Data in Blockchain Using Deep Learning Approach

    Recently there has been a notable increase in interest in Internet of Things (IoT)-based smart cities from both business and academia. Smart cities...

    Amit Kumar, Suresh Kumar in Wireless Personal Communications
    Article 01 April 2024
  12. Data encryption technology application in enterprise cost operation management based on cloud computing

    As a new type of calculation method, 5G cloud computing provides convenient and fast service items for enterprises and ordinary users with its...

    Bo You, **ao **ao in Soft Computing
    Article 14 June 2023
  13. Privacy-Preserving of Digital 6G IoT Based Cyber Phycical System in Medical Big-Data Application Using Homomorphic Encryption

    This abstract introduces a novel approach to privacy protection in cyber-physical systems built on the 6G Internet of Things (IoT), with an emphasis...

    Article 15 May 2024
  14. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system

    Through the use of Ethereum, a framework is designed to simplify data exchange mechanism, improve food traceability, and improve privacy. A supply...

    Jhong-Ting Lou, Showkat Ahmad Bhat, Nen-Fu Huang in Peer-to-Peer Networking and Applications
    Article 11 August 2023
  15. Bilateral hashing model of ECG signal encryption system using downhill peak follow (DPF)-based encryption technique

    This research suggests a unique ECG security solution based on the data pattern-based encryption paradigm to address security issues in ECG signal...

    A. N. Sanjeev Kumar, B. Ramesh Naik in Soft Computing
    Article 14 June 2023
  16. An Adaptive Lightweight Hybrid Encryption Scheme for Securing the Healthcare Data in Cloud-Assisted Internet of Things

    The revolution of IoT systems surpasses daily human facilities for providing financial, mechanical and social aspects. However, the secure...

    B. Padma Vijetha Dev, K. Venkata Prasad in Wireless Personal Communications
    Article 05 April 2023
  17. A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme

    With the rapid progress of network information technologies, security in medical data transmission has emerged as a popular research topic....

    S. Vidhya, V. Kalaivani in Peer-to-Peer Networking and Applications
    Article 31 January 2023
  18. Cloud Data Security Using Hybrid Encryption with Blockchain

    Securing cloud computing is a significant challenge for the cloud services sector. If someone is using the cloud to store data, choosing an...
    Kalaiselvi Soundappan, Govind Sreekar Shenoy in Advances in Communication and Applications
    Conference paper 2024
  19. An Encryption Scheme Based on Grain Stream Cipher and Chaos for Privacy Protection of Image Data on IoT Network

    IoT-enabled devices can collect information and act based on instructions over the Internet; they can sometimes communicate device to device. The IoT...

    Punam Kumari, Bhaskar Mondal in Wireless Personal Communications
    Article 03 April 2023
  20. Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search

    Public key encryption with keyword search (PEKS) has long been a promising way for secure data validation, which tells one whether the coming entry...

    Lei Xu, Chengzhi Xu, ... **aocan ** in Wireless Networks
    Article 31 August 2022
Did you find what you were looking for? Share feedback.