Showing 61 - 69 results of 69 for search '(optical OR optimal) encryption and authentication', query time: 0.11s Refine Results
  1. 61

    Mathematical Background and Algorithms of a Collection of Android Apps for a Google Play Store Page by Roland Szabo

    Published 2025-04-01
    “…Its mathematical framework centers on cryptographic methods for file security and authentication processes to prevent unauthorized access. …”
    Get full text
    Article
  2. 62

    Advancements In Blockchain Cryptography: Self-Signed Key Applications For Digital Record Protection by Pawan Maheshwari, Sunil Gupta

    Published 2025-06-01
    “…Furthermore, the proposed solution reduces the encryption time to 3650 ms and the decryption time to 3968 ms as compared to the traditional implementation of the blockchain, with ensured data integrity. …”
    Get full text
    Article
  3. 63

    EMQP: An Energy-Efficient Privacy-Preserving MAX/MIN Query Processing in Tiered Wireless Sensor Networks by Hua Dai, Geng Yang, Xiaolin Qin

    Published 2013-07-01
    “…To preserve privacy, the 0-1 encoding verification, keyed-hash message authentication coding, and symmetric encryption are applied to achieve the secret comparison of data items without knowing their real values. …”
    Get full text
    Article
  4. 64

    Secure healthcare data sharing and attack detection framework using radial basis neural network by Abhishek Kumar, Priya Batta, Pramod Singh Rathore, Sachin Ahuja

    Published 2025-05-01
    “…The proposed authenticate access control mechanism (PA2C) safeguards data integrity as well as the security and dependability of EHR data sharing are improved by the use of smart contracts, encryption, and secure key management. …”
    Get full text
    Article
  5. 65

    Differential analysis of lightweight cipher algorithm ACE based on MILP by Shuai LIU, Jie GUAN, Bin HU, Sudong MA

    Published 2023-01-01
    “…The differential property of the lightweight cipher algorithm ACE was researched.n-dimension ring AND-gate combination was defined and its differential property was described accurately by only O(n) expressions with the MILP method by analyzing the relationship among AND gates.The nonlinear operation of ACE was transformed to the 32-dimension ring AND-gate combination and the MILP differential model of ACE was proposed.According to the characteristics of Gurobi solver, a model for fast solving the MILP differential model of ACE was given.For ACE permutation with 3 to 6 steps, the optimal differential characteristic was obtained and its probability was improved by multi-difference technique.The differential forge attack on authenticated encryption algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">A</mi><mi mathvariant="script">E</mi></math></inline-formula>-128 and the differential collision attack on hash algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">H</mi></math></inline-formula>-256 was given with 3-step ACE permutation, and the success probability was 2<sup>-90.52</sup>.And it was proved that the 4-steps ACE permutation arrived the differential security bound of 128 bit.Actually, the MILP differential description of ring AND-gate combination can be applied on more cipher algorithms, such as SIMON, Simeck.…”
    Get full text
    Article
  6. 66

    Data Governance Navigation for Advanced Operations in Healthcare Excellence by Vahideh Zarea Gavgani, Aniseh Pourrasmi

    Published 2024-08-01
    “…Implementing Data Governance: A Step-by-Step Guide 1- Define the scope: Specify the organizational structure, authorities, councils, and roles. 2- Form a governance team: Create a team that includes a chief data officer and a chief medical information officer to drive accountability. 3- Identify key metrics: Focus on data accuracy, process improvement, and efficiency. 4- Understand compliance standards: Familiarize yourself with existing regulations and policies. 5- Secure the system: Implement encryption, masking, and hashing policies for protected health information. 6- Setting user permissions: Create authentication protocols and monitor data access. 7- Educate your team: Educate your teams on adopting and following a data governance plan. …”
    Get full text
    Article
  7. 67

    Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0 by Mohammed El-Hajj, Teklit Haftu Gebremariam

    Published 2024-07-01
    “…Addressing this, this study introduces the ASCON algorithm for lightweight authenticated encryption with associated data, enhancing confidentiality, integrity, and authenticity within IoT limitations. …”
    Get full text
    Article
  8. 68

    A Novel Approach to Strengthening Cryptography Using RSA, Efficient Domination and Fuzzy Logic by Ghulam Muhiuddin, Annamalai Meenakshi, Janusz Kacprzyk, Ganesan Ambika, Hossein Rashmamlou

    Published 2025-05-01
    “…A secured communications system is a structure or infrastructure that is intended to ensure the confidentiality, integrity, and authenticity of data being exchanged between entities. …”
    Get full text
    Article
  9. 69

    DWT-SVD Based Watermarking for High-Resolution Medical Holographic Images by Fahrettin Horasan, Muhammed Ali Pala, Ali Durdu, Akif Akgül, Ömer Faruk Akmeşe, Mustafa Zahid Yıldız

    Published 2022-01-01
    “…Watermarking is one of the most common techniques used to protect data’s authenticity, integrity, and security. The obfuscation in the frequency domain used in the watermarking method makes the watermarking stronger than the obfuscation in the spatial domain. …”
    Get full text
    Article