-
161
A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices
Published 2021-01-01“…The success of results is evaluated by the completeness of data exchange, durations, the complexity of encryption-decryption processes, and strength of cryptography using a microcomputer-based implementation. …”
Get full text
Article -
162
QuantumNet: An enhanced diabetic retinopathy detection model using classical deep learning-quantum transfer learning
Published 2025-06-01“…Quantum computing, leveraging quantum mechanics, offers revolutionary potential for faster problem-solving across fields like cryptography, optimization, and medicine. This research introduces QuantumNet, a hybrid model combining classical DL and quantum transfer learning to enhance DR detection. …”
Get full text
Article -
163
Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
Published 2012-07-01“…Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. …”
Get full text
Article -
164
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01“…Cryptography serves as the cornerstone for safe communication and data security in today's digital environment. …”
Get full text
Article -
165
Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain
Published 2019-09-01“…To overcome these limitations, we have proposed an efficient and secure heterogeneous scheme for body sensor networks, in which biosensor nodes use a certificate-less cryptography environment to resolve the key escrow and certificate-management problems, while MS uses a public key infrastructure environment to enhance the scalability of the networks. …”
Get full text
Article -
166
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01“…There were still limitations for anonymity, scrambling, or access control-based traditional privacy desensitization measures, cryptography-based measures, and federated learning-based measures, while privacy computing theory provided a computational and information system framework for full-lifecycle protection, which needed to be combined with different application scenarios to implement full-lifecycle privacy information protection.…”
Get full text
Article -
167
Research on power plant security issues monitoring and fault detection using attention based LSTM model
Published 2025-01-01“…Results The findings acquired from this evaluation are compared to the results received from existing detection approaches such as Cryptography, Intrusion Detection System (IDS) methods, and Network Defense Schemes. …”
Get full text
Article -
168
EPRNG: Effective Pseudo-Random Number Generator on the Internet of Vehicles Using Deep Convolution Generative Adversarial Network
Published 2025-01-01“…In the last decade, several cryptography-based protocols have been proposed as intuitive solutions to protect vehicles from information leakage and intrusions. …”
Get full text
Article -
169
Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks
Published 2024-12-01Get full text
Article -
170
An Upper Bound for Locating Strings with High Probability Within Consecutive Bits of Pi
Published 2025-01-01“…This work has potential applications in Cryptography that use the number <inline-formula><math display="inline"><semantics><mi>π</mi></semantics></math></inline-formula> for random sequence generation, offering insights into the number of bits of <inline-formula><math display="inline"><semantics><mi>π</mi></semantics></math></inline-formula> required to ensure good randomness properties.…”
Get full text
Article -
171
Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)
Published 2024-01-01“…Hence, in this study, a symmetric encryption and decryption protocol was designed to ensure infosecurity of biosignals and medical images and assist in specific purposes in disease diagnosis. For a symmetric cryptography scheme, this study proposed a key generator combining a chaotic map and Bell inequality and generating unordered numbers and unrepeated 256 secret keys in the key space. …”
Get full text
Article -
172
Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…Data transmission will be insecure without a data security process. Cryptography is one of the options for securing data. …”
Get full text
Article -
173
Pengamanan Pesan E-Complaint Fasilitas dan Kinerja Civitas Akademika Menggunakan Algoritma RSA
Published 2022-12-01“…This study proposes the application of cryptography, which converts messages into code, so the actual message is not known. …”
Get full text
Article -
174
Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature
Published 2023-12-01“…Abstract This research studies how cryptography uses the Secure Hash Algorthm 256 (SHA-256) and Rivest Shamir Adleman (RSA) to maintain the authenticity of the Pass Certificate (SKL) using a web-based Quick Response (QR) code. …”
Get full text
Article -
175
Skema Kredibilitas Sertifikat Berbasis Ilearning Gamifikasi Blockchain pada Kampus Merdeka
Published 2023-02-01“…The primary purpose of this research is to apply Blockchain technology to increase the use of several encryption technologies authentication and decentralized data distribution for SHA256 data storage, namely the use of cryptography used in Blockchain. This research method uses the SDLC (System Development Life Cycle) method by building a system, and information collection is made through observation and questionnaires using Google Form. …”
Get full text
Article -
176
Single-Photon Detectors for Quantum Integrated Photonics
Published 2024-12-01“…Applications such as quantum key distribution, quantum cryptography, and quantum computation demand the ability to detect individual quanta of light and distinguish between single-photon states and multi-photon states, particularly when operating within waveguide systems. …”
Get full text
Article