-
61
Mathematical Background and Algorithms of a Collection of Android Apps for a Google Play Store Page
Published 2025-04-01“…Its mathematical framework centers on cryptographic methods for file security and authentication processes to prevent unauthorized access. …”
Get full text
Article -
62
Advancements In Blockchain Cryptography: Self-Signed Key Applications For Digital Record Protection
Published 2025-06-01“…Furthermore, the proposed solution reduces the encryption time to 3650 ms and the decryption time to 3968 ms as compared to the traditional implementation of the blockchain, with ensured data integrity. …”
Get full text
Article -
63
EMQP: An Energy-Efficient Privacy-Preserving MAX/MIN Query Processing in Tiered Wireless Sensor Networks
Published 2013-07-01“…To preserve privacy, the 0-1 encoding verification, keyed-hash message authentication coding, and symmetric encryption are applied to achieve the secret comparison of data items without knowing their real values. …”
Get full text
Article -
64
Secure healthcare data sharing and attack detection framework using radial basis neural network
Published 2025-05-01“…The proposed authenticate access control mechanism (PA2C) safeguards data integrity as well as the security and dependability of EHR data sharing are improved by the use of smart contracts, encryption, and secure key management. …”
Get full text
Article -
65
Differential analysis of lightweight cipher algorithm ACE based on MILP
Published 2023-01-01“…The differential property of the lightweight cipher algorithm ACE was researched.n-dimension ring AND-gate combination was defined and its differential property was described accurately by only O(n) expressions with the MILP method by analyzing the relationship among AND gates.The nonlinear operation of ACE was transformed to the 32-dimension ring AND-gate combination and the MILP differential model of ACE was proposed.According to the characteristics of Gurobi solver, a model for fast solving the MILP differential model of ACE was given.For ACE permutation with 3 to 6 steps, the optimal differential characteristic was obtained and its probability was improved by multi-difference technique.The differential forge attack on authenticated encryption algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">A</mi><mi mathvariant="script">E</mi></math></inline-formula>-128 and the differential collision attack on hash algorithm ACE-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mi mathvariant="script">H</mi></math></inline-formula>-256 was given with 3-step ACE permutation, and the success probability was 2<sup>-90.52</sup>.And it was proved that the 4-steps ACE permutation arrived the differential security bound of 128 bit.Actually, the MILP differential description of ring AND-gate combination can be applied on more cipher algorithms, such as SIMON, Simeck.…”
Get full text
Article -
66
Data Governance Navigation for Advanced Operations in Healthcare Excellence
Published 2024-08-01“…Implementing Data Governance: A Step-by-Step Guide 1- Define the scope: Specify the organizational structure, authorities, councils, and roles. 2- Form a governance team: Create a team that includes a chief data officer and a chief medical information officer to drive accountability. 3- Identify key metrics: Focus on data accuracy, process improvement, and efficiency. 4- Understand compliance standards: Familiarize yourself with existing regulations and policies. 5- Secure the system: Implement encryption, masking, and hashing policies for protected health information. 6- Setting user permissions: Create authentication protocols and monitor data access. 7- Educate your team: Educate your teams on adopting and following a data governance plan. …”
Get full text
Article -
67
Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0
Published 2024-07-01“…Addressing this, this study introduces the ASCON algorithm for lightweight authenticated encryption with associated data, enhancing confidentiality, integrity, and authenticity within IoT limitations. …”
Get full text
Article -
68
A Novel Approach to Strengthening Cryptography Using RSA, Efficient Domination and Fuzzy Logic
Published 2025-05-01“…A secured communications system is a structure or infrastructure that is intended to ensure the confidentiality, integrity, and authenticity of data being exchanged between entities. …”
Get full text
Article -
69
DWT-SVD Based Watermarking for High-Resolution Medical Holographic Images
Published 2022-01-01“…Watermarking is one of the most common techniques used to protect data’s authenticity, integrity, and security. The obfuscation in the frequency domain used in the watermarking method makes the watermarking stronger than the obfuscation in the spatial domain. …”
Get full text
Article