Showing 41 - 60 results of 69 for search '(optical OR optimal) encryption and authentication', query time: 0.10s Refine Results
  1. 41

    Blockchain-enabled verification of medical records using soul-bound tokens and cloud computing by Puneeta Singh, Shrddha Sagar, Sofia Singh, Haya Mesfer Alshahrani, Masresha Getahun, Ben Othman Soufiene

    Published 2024-10-01
    “…Non-transferable Soul-bound tokens (SBTs) can be a safe and unbreakable way to authenticate medical records by generating encrypted code, which allows the user to authenticate a portion of data. …”
    Get full text
    Article
  2. 42

    Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs by N. Naveen, J. Nirmaladevi

    Published 2025-07-01
    “…To resolve this issue, we proposed a novel Secure Bio-Inspired Optimization (Sec-BIO) methodology for routing over MANET. …”
    Get full text
    Article
  3. 43
  4. 44

    Data Governance Design for Optimization of Hospital Management Information System (SIM-RS) at ABC Regional Hospital by Muhammad Furqan Nazuli, Irfan Walhidayah, Neng Ayu Herawati, Lenny Putri Yulianti, Kridanto Surendro

    Published 2025-06-01
    “…Implementing the Master Patient Index (MPI) reduces duplicate records, while Two-Factor Authentication (2FA) and AES-256 encryption strengthen data security. …”
    Get full text
    Article
  5. 45

    Bi directional sparse attention recurrent autoencoder based intrusion detection for VANET security with tuna swarm optimization by R. Gopi, V. Thiruppathy Kesavan, Md. Jakir Hossen, Nor Hidayati Binti Abdul Aziz

    Published 2025-05-01
    “…The lack of intrusion detection systems, inadequate encryption methods, insecure communication routes, and inadequate authentication processes are some of the technological flaws in VANETs that make smart vehicles vulnerable to attacks. …”
    Get full text
    Article
  6. 46

    A novel integration of Web 3.0 with hybrid chaotic-hippo-optimized Blockchain framework for healthcare 4.0 by S Punitha, Preetha K S

    Published 2024-12-01
    “…The findings ultimately provide a comprehensive view of the optimized encryption scheme on blockchain technology and the future pathways for secure authentication frameworks in HealthCare 4.0.…”
    Get full text
    Article
  7. 47

    Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing by P. Anbumani, R. Dhanapal

    Published 2023-03-01
    “…The paradigm imposes encrypted access control, along with specific enhanced access capabilities. …”
    Get full text
    Article
  8. 48

    A hybrid fog-edge computing architecture for real-time health monitoring in IoMT systems with optimized latency and threat resilience by Umar Islam, Mohammed Naif Alatawi, Ali Alqazzaz, Sulaiman Alamro, Babar Shah, Fernando Moreira

    Published 2025-07-01
    “…The architecture integrates robust security measures, including end-to-end encryption and distributed authentication, to counter rising data breaches and unauthorized access in IoMT networks. …”
    Get full text
    Article
  9. 49

    Deep convolutional neural network based archimedes optimization algorithm for heart disease prediction based on secured IoT enabled health care monitoring system by Sureshkumar S, Santhosh Babu A. V, Joseph James S, Maranco M

    Published 2025-07-01
    “…The Matrix-based RSA encryption technology and a blockchain-based data storage concept provide safe data transmission and authorization. …”
    Get full text
    Article
  10. 50
  11. 51

    A deep learning based intrusion detection system for CAN vehicle based on combination of triple attention mechanism and GGO algorithm by Hongwei Yang, Mehdi Effatparvar

    Published 2025-06-01
    “…Because the portal of CAN does not have systems of security, like encryption and authentication in order to contend with cyber-attacks, the necessity for a system of intrusion detection for identifying attacks on the portal of CAN is really essential. …”
    Get full text
    Article
  12. 52

    Integrated Protocols to Ensure Security Services in Wireless Sensor Networks by Mohammed Faisal, Jalal Al-Muhtadi, Abdullah Al-Dhelaan

    Published 2013-07-01
    “…Security in WSN demands authentication, confidentiality, integrity, balancing the energy cost, nonreputation, and scalability services. …”
    Get full text
    Article
  13. 53

    Hardware assurance with silicon photonic physical unclonable functions by Mohammad Amin Mahdian, Ebadollah Taheri, Kaveh Rahbardar Mojaver, Mahdi Nikdast

    Published 2024-10-01
    “…Photonic Physical Unclonable Functions (PUFs) leverage the response from the photonic devices that are prone to inherent physical variations to generate unique and unpredictable signature identifiers which are then utilized by an authentication system for identification or encryption purposes. …”
    Get full text
    Article
  14. 54

    Enhancing Efficiency and Security in MTC Environments: A Novel Strategy for Dynamic Grouping and Streamlined Management by Maloth Bhavsingh, K Samunnisa, A Mallareddy

    Published 2024-04-01
    “…Our proposed solution integrates advanced cryptographic methods, including an optimized Authenticated Message Authentication Code (AMAC) and lightweight encryption, sophisticated optimization algorithms for dynamic grouping, and an efficient, lightweight group management protocol. …”
    Get full text
    Article
  15. 55

    Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD by Mustafa Khairallah

    Published 2025-03-01
    “… Pseudo-Random Injections (PRIs) have been used in several applications in symmetric-key cryptography, such as in the idealization of Authenticated Encryption with Associated Data (AEAD) schemes, building robust AEAD, and, recently, in converting a committing AEAD scheme into a succinctly committing AEAD scheme. …”
    Get full text
    Article
  16. 56

    Zero Trust Strategies for Cyber-Physical Systems in 6G Networks by Abdulrahman K. Alnaim, Ahmed M. Alwakeel

    Published 2025-03-01
    “…This study proposes a Zero Trust security framework for 6G-enabled Cyber-Physical Systems (CPS), integrating Adaptive Access Control (AAC), end-to-end encryption, and blockchain to enhance security, scalability, and real-time threat detection. …”
    Get full text
    Article
  17. 57

    A Novel QR Code–Based Solution for Secure Electronic Health Record Transfer in Venous Thromboembolism Home Rehabilitation Management: Algorithm Development and Validation by Changzhen Li, Zhigeng Jin, Fei Wang, Zheqi Zhang, Binbin Liu, Yutao Guo

    Published 2025-08-01
    “…It uses BPE, Avro, and Gzip for optimized data compression and uses ChaCha20 and BLAKE3 for encryption and authentication. …”
    Get full text
    Article
  18. 58

    Enabling Secure and Scalable GDPR-Compliant Blockchain-Based e-KYC With Efficient Redaction by Somchart Fugkeaw, Surabordin Sungchai, Supawit Nakprame, Piphattra Sreekongpan

    Published 2025-01-01
    “…Our solution introduces three key innovations: 1) ZK-Rollup-based authentication integrated with sharded blockchain architecture, enabling off-chain proof batching and distributed verification across shards for high-throughput, low-latency validation; 2) adaptive proxy re-encryption to support secure and dynamic customer data portability between host and requesting FIs; and 3) an optimized redactable blockchain protocol using off-chain Chameleon Hash collision generation and threshold cryptography-based key rotation to enable efficient, secure, and verifiable data updates in compliance with GDPR. …”
    Get full text
    Article
  19. 59
  20. 60

    Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks by Sharaf Aldeen Abdulkadhum Abbas, Abdullahi Abdu Ibrahim

    Published 2024-06-01
    “…On the other hand, if we consider the conventional security approaches, these security devices mostly use traditional security protocols such as password encryption and user authentication respectively. The aim of this paper is to analyze the architecture of attack detection that are deployed in the IoT network and correspondingly demonstrate whether their function is to track and follow or even attack subjects. …”
    Get full text
    Article