-
21
A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding
Published 2025-04-01“…However, most blockchain based access control methods are one-way, and user access policies are public, which cannot simultaneously meet the needs of dynamic attribute updates, two-way verification of users and data, and secure data transmission. To handle such challenges, we propose an attribute-based encryption scheme that satisfies real-time and secure sharing requirements through attribute updates and policy hiding. …”
Get full text
Article -
22
OpticalTrust: A Sensor-to-Blockchain Framework Using Free-Space Optical Communication
Published 2024-12-01“…In the dynamic landscape of the tech industry, the escalating requirement for swift and secure data transmission has catalyzed innovation in integrated communication systems. …”
Get full text
Article -
23
Exploring Dynamics and Hardware Implementation of an Enhanced 5D Hyperchaotic Memristive System Inspired by Sprott-C System
Published 2025-03-01“…To this respect, detailed mathematical modeling and numerical simulations about the stability of the system’s equilibria, bifurcations, and hyperchaotic dynamics were conducted and showed a very wide variety of behaviors of great potential in cryptographic applications and secure data transmission. Then, the flexibility and efficiency of the real-time operating environment were demonstrated, and the system was actually implemented on a field-programmable gate array (FPGA) hardware platform. …”
Get full text
Article -
24
Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm
Published 2023-12-01“…Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes. …”
Get full text
Article -
25
Integrated Photonics for IoT, RoF, and Distributed Fog–Cloud Computing: A Comprehensive Review
Published 2025-07-01“…Fog computing, with its edge-focused processing and analytics, benefits from the compactness and low latency of integrated photonics for real-time signal processing, sensing, and secure data transmission near IoT devices. PICs also facilitate the low-loss, high-speed modulation, transmission, and detection of RF signals in scalable Radio-over-Fiber (RoF) links, enabling seamless IoT integration with Cloud and Fog networks. …”
Get full text
Article -
26
Design and development of full self-service smart shopping system for unmanned supermarket
Published 2025-08-01“…To address these issues, this study proposes a fully self-service smart shopping system, comprising three key modules: a smart shopping cart, a client app, and a back-end management platform, with full-chain encryption using TLS (Transport Layer Security) and RSA (Rivest Shamir Adleman) to ensure secure data transmission. The smart shopping system utilizes a KNN (K Nearest Neighbor) collaborative filtering recommendation algorithm to improve the relevance and accuracy of product suggestions. …”
Get full text
Article -
27
pycastx: A Python library for lightweight data encryption in IoT using ECC and metaheuristics based high-entropy keys and dynamic S-Box
Published 2025-09-01“…This work narrows the gap between theoretical cryptography and its practical implementation, providing a comprehensive solution for secure data transmission in modern communication systems.…”
Get full text
Article -
28
Enhancing IoT security with a DNA-based lightweight cryptography system
Published 2025-04-01“…The research explains how DNA-LWCS (DNA-based lightweight cryptography system) utilizes basic encryption methods to secure data transmission against system complexity while maintaining security effectiveness. …”
Get full text
Article -
29
Huffman coding-based data reduction and quadristego logic for secure image steganography
Published 2025-05-01“…Ensuring secure data transmission is critical for maintaining confidentiality and has become increasingly important. …”
Get full text
Article -
30
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01“…This paper details the design, implementation, and performance evaluation of qTrustNet VPN, showcasing its potential to secure data transmission against emerging quantum threats.…”
Get full text
Article -
31
Secure Cooperative Dual-RIS-Aided V2V Communication: An Evolutionary Transformer–GRU Framework for Secrecy Rate Maximization in Vehicular Networks
Published 2025-07-01“…In this paper, we investigate the problem of secrecy rate maximization in a cooperative dual-RIS-aided V2V communication network, where two cascaded RISs are deployed to collaboratively assist with secure data transmission between mobile vehicular nodes in the presence of eavesdroppers. …”
Get full text
Article -
32
A secure hybrid deep learning framework for brain tumor detection and classification
Published 2025-03-01“…The method aims to enhance image quality, ensure secure data transmission, and achieve highly accurate classification of brain tumors while addressing challenges related to manual interpretation and data security. …”
Get full text
Article -
33
From hospital to home: a comprehensive platform supporting cardiac rehabilitation post-revascularization
Published 2025-07-01“…., exercise animations, CPR tutorials), and secure data transmission. Then, in this phase, think-aloud protocols (n = 18 patients) and heuristic evaluation (n = 5 HCI experts) were employed for usability testing. …”
Get full text
Article -
34
Research Framework and Anticipated Results of Key Technologies for Distributed Certificate-less Network Identity Systems
Published 2025-05-01“…In certificate-less distributed key management, smart contract-based key management schemes and multi-party attack-resistant key agreement protocols were developed, achieving breakthroughs in distributed key generation and anonymous secure data transmission. In hardware-enhanced high-parallel distributed terminal access, optimized acceleration schemes for IoT nodes and secure integration of heterogeneous terminals were designed, achieving authentication hash computing speeds of up to 200 Gbit/s and IoT authentication traffic handling of up to 100 Gbit/s. …”
Get full text
Article -
35
Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks
Published 2022-12-01“…In addition, only a few group key agreements are integrated into secure data transmissions. Therefore, a key agreement using the hierarchy-based cluster elliptic curve key agreement named HCECKA is proposed in this study to deal with secure data transmissions in wireless sensor networks. …”
Get full text
Article -
36
On the Firmness Code Noising to the Statistical Analysis of the Observable Data of Repeated Repetition
Published 2015-02-01“…We give a structural description of the model of secured data transmission and construct an information analytical model of the observer. …”
Get full text
Article -
37
FPGA-Based Implementation of an Underwater Quantum Key Distribution System With BB84 Protocol
Published 2023-01-01“…As threats in the maritime domain diversify, securing data transmission becomes critical for underwater wireless networks designed for the surveillance of critical infrastructure and maritime border protection. …”
Get full text
Article -
38
Low power IoT device communication through hybrid AES-RSA encryption in MRA mode
Published 2025-04-01“…This fusion approach leverages the strengths of both algorithms, encrypting the AES key using the improved RSA algorithm to bolster data security while maintaining efficient transmission.Performance evaluations of the RSA-AES hybrid algorithm demonstrate its exceptional capability in securing data transmission within edge scenarios,and the security of this hybrid algorithm is analyzed. …”
Get full text
Article