Showing 161 - 176 results of 176 for search '"Cryptography"', query time: 0.05s Refine Results
  1. 161

    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices by Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli, Kim Smith

    Published 2021-01-01
    “…The success of results is evaluated by the completeness of data exchange, durations, the complexity of encryption-decryption processes, and strength of cryptography using a microcomputer-based implementation. …”
    Get full text
    Article
  2. 162

    QuantumNet: An enhanced diabetic retinopathy detection model using classical deep learning-quantum transfer learning by Manish Bali, Ved Prakash Mishra, Anuradha Yenkikar, Diptee Chikmurge

    Published 2025-06-01
    “…Quantum computing, leveraging quantum mechanics, offers revolutionary potential for faster problem-solving across fields like cryptography, optimization, and medicine. This research introduces QuantumNet, a hybrid model combining classical DL and quantum transfer learning to enhance DR detection. …”
    Get full text
    Article
  3. 163

    Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks by Tung-Shih Su, Mei-Wen Huang, Wei-Shou Li, Wen-Shyong Hsieh

    Published 2012-07-01
    “…Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. …”
    Get full text
    Article
  4. 164

    Cryptanalysis of hyperchaotic S-box generation and image encryption by Mohammad Mazyad Hazzazi, Gulraiz, Rashad Ali, Muhammad Kamran Jamil, Sameer Abdullah Nooh, Fahad Alblehai

    Published 2024-12-01
    “…Cryptography serves as the cornerstone for safe communication and data security in today's digital environment. …”
    Get full text
    Article
  5. 165

    Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain by Jawaid Iqbal, Arif Iqbal Umar, Noorul Amin, Abdul Waheed

    Published 2019-09-01
    “…To overcome these limitations, we have proposed an efficient and secure heterogeneous scheme for body sensor networks, in which biosensor nodes use a certificate-less cryptography environment to resolve the key escrow and certificate-management problems, while MS uses a public key infrastructure environment to enhance the scalability of the networks. …”
    Get full text
    Article
  6. 166

    Review of privacy computing techniques for multi-party data fusion analysis by LIU Shenglong, HUANG Xiuli, JIANG Yiwen, JIANG Jiawei, TIAN Yuechi, ZHOU Zejun, NIU Ben

    Published 2024-12-01
    “…There were still limitations for anonymity, scrambling, or access control-based traditional privacy desensitization measures, cryptography-based measures, and federated learning-based measures, while privacy computing theory provided a computational and information system framework for full-lifecycle protection, which needed to be combined with different application scenarios to implement full-lifecycle privacy information protection.…”
    Get full text
    Article
  7. 167

    Research on power plant security issues monitoring and fault detection using attention based LSTM model by Shengda Wang, Zeng Dou, Danni Liu, Han Xu, Ji Du

    Published 2025-01-01
    “…Results The findings acquired from this evaluation are compared to the results received from existing detection approaches such as Cryptography, Intrusion Detection System (IDS) methods, and Network Defense Schemes. …”
    Get full text
    Article
  8. 168

    EPRNG: Effective Pseudo-Random Number Generator on the Internet of Vehicles Using Deep Convolution Generative Adversarial Network by Chenyang Fei, Xiaomei Zhang, Dayu Wang, Haomin Hu, Rong Huang, Zejie Wang

    Published 2025-01-01
    “…In the last decade, several cryptography-based protocols have been proposed as intuitive solutions to protect vehicles from information leakage and intrusions. …”
    Get full text
    Article
  9. 169
  10. 170

    An Upper Bound for Locating Strings with High Probability Within Consecutive Bits of Pi by Víctor Manuel Silva-García, Manuel Alejandro Cardona-López, Rolando Flores-Carapia

    Published 2025-01-01
    “…This work has potential applications in Cryptography that use the number <inline-formula><math display="inline"><semantics><mi>π</mi></semantics></math></inline-formula> for random sequence generation, offering insights into the number of bits of <inline-formula><math display="inline"><semantics><mi>π</mi></semantics></math></inline-formula> required to ensure good randomness properties.…”
    Get full text
    Article
  11. 171

    Information Security and Artificial Intelligence&#x2013;Assisted Diagnosis in an Internet of Medical Thing System (IoMTS) by Pi-Yun Chen, Yu-Cheng Cheng, Zi-Heng Zhong, Feng-Zhou Zhang, Neng-Sheng Pai, Chien-Ming Li, Chia-Hung Lin

    Published 2024-01-01
    “…Hence, in this study, a symmetric encryption and decryption protocol was designed to ensure infosecurity of biosignals and medical images and assist in specific purposes in disease diagnosis. For a symmetric cryptography scheme, this study proposed a key generator combining a chaotic map and Bell inequality and generating unordered numbers and unrepeated 256 secret keys in the key space. …”
    Get full text
    Article
  12. 172

    Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy by Diah Ratih Destyorini, Ari Kusyanti, Reza Andria Siregar

    Published 2022-12-01
    “…Data transmission will be insecure without a data security process. Cryptography is one of the options for securing data.  …”
    Get full text
    Article
  13. 173

    Pengamanan Pesan E-Complaint Fasilitas dan Kinerja Civitas Akademika Menggunakan Algoritma RSA by Dwi Yuny Sylfania, Fransiskus Panca Juniawan, Laurentinus Laurentinus, Hengki Hengki

    Published 2022-12-01
    “…This study proposes the application of cryptography, which converts messages into code, so the actual message is not known. …”
    Get full text
    Article
  14. 174

    Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature by Juniar Hutagalung, Puji Sari Ramadhan, Sarah Juliana Sihombing

    Published 2023-12-01
    “…Abstract    This research studies how cryptography uses the Secure Hash Algorthm 256 (SHA-256) and Rivest Shamir Adleman (RSA) to maintain the authenticity of the Pass Certificate (SKL) using a web-based Quick Response (QR) code. …”
    Get full text
    Article
  15. 175

    Skema Kredibilitas Sertifikat Berbasis Ilearning Gamifikasi Blockchain pada Kampus Merdeka by Qurotul Aini, Nur Azizah, Rahmat Salam, Nuke Puji Lestari Santoso, Fitra Putri Oganda

    Published 2023-02-01
    “…The primary purpose of this research is to apply Blockchain technology to increase the use of several encryption technologies authentication and decentralized data distribution for SHA256 data storage, namely the use of cryptography used in Blockchain. This research method uses the SDLC (System Development Life Cycle) method by building a system, and information collection is made through observation and questionnaires using Google Form. …”
    Get full text
    Article
  16. 176