We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 8,860 results
  1. Secure and efficient multi-key FHE scheme supporting multi-bit messages from LWE preserving non-interactive decryption

    We consider multi-key fully homomorphic encryption (multi-key FHE) which is the richest variant of fully homomorphic encryption (FHE) that allows...

    Article 14 May 2022
  2. A reconfigurable and compact subpipelined architecture for AES encryption and decryption

    AES has been used in many applications to provide the data confidentiality. A new 32-bit reconfigurable and compact architecture for AES encryption...

    Ke Li, Hua Li, Graeme Mund in EURASIP Journal on Advances in Signal Processing
    Article Open access 09 January 2023
  3. Blockchain-Based Fair Payment for ABE with Outsourced Decryption

    Attribute-based encryption (ABE) is an advanced public-key encryption supporting fine-grained access control and flexible sharing of encrypted data....

    Linjian Hong, Kai Zhang, ... Haifeng Qian in Peer-to-Peer Networking and Applications
    Article 04 November 2022
  4. A two-layer networks-based audio encryption/decryption scheme via fixed-time cluster synchronization

    In this paper, an audio encryption/decryption scheme based on the cluster synchronization of two-layer complex networks within fixed-time is...

    Lili Zhou, **aohui Li, ... Weina Ma in Soft Computing
    Article 22 July 2022
  5. Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks

    Fifth Generation (5G) networks provide data communications through various latest technologies including Software Defined Networks (SDN), Artificial...

    S. Pradeep, S. Muthurajkumar, ... A. Kannan in Soft Computing
    Article 31 January 2024
  6. Encryption/Decryption with Optical Transform

    In this chapter, the methods of image encryption and decryption based on optical transformation are introduced. The extended fractional Fourier...
    Zhengjun Liu, Yu Ji, ... Hang Chen in Recent Advanced in Image Security Technologies
    Chapter 2023
  7. Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow

    Attribute-based encryption (ABE) can achieve data confidentiality as well as fine-grained access control of encrypted data in data outsourcing...

    Yan Zhou, Changgen Peng, ... Weijie Tan in Mobile Networks and Applications
    Article 11 March 2023
  8. Color Image Encryption and Decryption by Using Optical Scanning Cryptography Method

    In this paper, a computer simulation of optical encryption for color images are presented based on the optical scanning cryptography technique that...
    Mohamed J. Albermani, Eman M. Al-Hilo, Kawther H. Al-khafaji in Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems
    Conference paper 2023
  9. An Enhanced D Level Cut-Off Point-Quantum Secret Sharing Access Structure Scheme Based Efficient Monitoring Key Ciphertext Attributes with Encryption Access Control with Blockchain and Key Mechanism for Security in Cloud Computing

    Due to the exponential growth of cloud data and network services, computational resources and cloud data security have one of the most attractive...

    Atul Kumar Srivastava, Dhiraj Pandey, Alok Agarwal in Wireless Personal Communications
    Article 01 March 2024
  10. Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution

    The act of implementing specific measures to ensure the security of cryptographic keys within an organization is referred to as key management....

    J. Vellingiri, T.R. Vedhavathy, ... C. Bala Subramanian in Peer-to-Peer Networking and Applications
    Article 08 June 2024
  11. RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission

    Security is an essential task while focusing on confidential level of patient information during medical data transmission. The image encryption...

    M. N. Sharada Guptha, M. N. Eshwarappa in Wireless Personal Communications
    Article 24 February 2022
  12. An Advanced Encryption Standard in Memory (AESIM) Efficient, High Performance S-box Based AES Encryption and Decryption Architecture on VLSI

    As CMOS(Complementary Metal Oxide Semiconductor) technology reaches its scaling threshold, evolving non-volatile memory approaches are becoming a...

    R. Anusha Padmavathi, K. S. Dhanalakshmi in Wireless Personal Communications
    Article 29 October 2021
  13. A New Algorithm for Encryption and Decryption Using AUM Block Sum Labeling

    The advantages of digital data are spreading throughout all industries in the modern world, and securing data while exchanging is extremely...
    Conference paper 2024
  14. An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution

    One of the most flamboyant technological novelties of today's world is cloud computing, which has been fuelled by the increase in the number of smart...

    Jananya Sivakumar, Sannasi Ganapathy in Wireless Personal Communications
    Article 01 December 2023
  15. A Decomposed Encryption-Decryption Scheme for Deception Attack Detection and Privacy-Preserving

    This paper deals with the deception attack detection and privacy-preserving problem for the multi-agent systems with malicious attacks. First, a...
    Conference paper 2024
  16. SE-LAKAF: Security enhanced lightweight authentication and key agreement framework for smart grid network

    The Smart Grid (SG) improves the reliability and efficiency of the data sharing and communication of the traditional power grid system. This...

    Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel in Peer-to-Peer Networking and Applications
    Article 19 May 2023
  17. Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution

    Security techniques based on conventional cryptography assume keys are disseminated prior to secure communications in traditional security...

    A. Ahilan, A. Jeyam in Wireless Personal Communications
    Article 15 November 2022
  18. Study on the Encryption and Decryption Capabilities of Hybrid Techniques for Images

    Data plays an important role in modern life, and because more and more gadgets are connecting to the internet, the amount of data stored online is...
    Nongmeikapam Thoiba Singh, Rahul Dayal, ... Aishwarya Bhardwaj in Intelligent Sustainable Systems
    Conference paper 2023
  19. Need of Hour: Hybrid Encryption and Decryption Standards (HEaDS) Algorithm for Data Security

    With the significant advancements in information technology, a massive amount of data is being shared over the internet. And over the previous few...
    Conference paper 2023
  20. FPGA hardware acceleration of an improved chaos-based cryptosystem for real-time image encryption and decryption

    This paper introduces a full **linx FPGA-Zynq implementation of a robust cryptosystem for real-time image encryption and decryption. Firstly, a...

    Mohamed Gafsi, Mohamed Ali Hajjaji, ... Abdellatif Mtibaa in Journal of Ambient Intelligence and Humanized Computing
    Article 28 October 2021
Did you find what you were looking for? Share feedback.