Showing 21 - 38 results of 38 for search '(("secure data transmission") OR ("secure data transition"))', query time: 0.16s Refine Results
  1. 21

    A secure and scalable IoT access control framework with dynamic attribute updates and policy hiding by Zhigang Xu, Wan Zhou, Hongmu Han, Xinhua Dong, Shiguang Zhang, Ziping Hu

    Published 2025-04-01
    “…However, most blockchain based access control methods are one-way, and user access policies are public, which cannot simultaneously meet the needs of dynamic attribute updates, two-way verification of users and data, and secure data transmission. To handle such challenges, we propose an attribute-based encryption scheme that satisfies real-time and secure sharing requirements through attribute updates and policy hiding. …”
    Get full text
    Article
  2. 22

    OpticalTrust: A Sensor-to-Blockchain Framework Using Free-Space Optical Communication by Parveen Bajaj, Aman Kataria, Vikram Puri, Sachin Gupta, Hong Min

    Published 2024-12-01
    “…In the dynamic landscape of the tech industry, the escalating requirement for swift and secure data transmission has catalyzed innovation in integrated communication systems. …”
    Get full text
    Article
  3. 23

    Exploring Dynamics and Hardware Implementation of an Enhanced 5D Hyperchaotic Memristive System Inspired by Sprott-C System by Abdulmajeed Abdullah Mohammed Mokbel, Fei Yu, Yumba Musoya Gracia, Bohong Tan, Hairong Lin, Herbert Ho-Ching Iu

    Published 2025-03-01
    “…To this respect, detailed mathematical modeling and numerical simulations about the stability of the system’s equilibria, bifurcations, and hyperchaotic dynamics were conducted and showed a very wide variety of behaviors of great potential in cryptographic applications and secure data transmission. Then, the flexibility and efficiency of the real-time operating environment were demonstrated, and the system was actually implemented on a field-programmable gate array (FPGA) hardware platform. …”
    Get full text
    Article
  4. 24

    Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm by Sanjay Kumar, Deepmala Sharma

    Published 2023-12-01
    “…Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes. …”
    Get full text
    Article
  5. 25

    Integrated Photonics for IoT, RoF, and Distributed Fog–Cloud Computing: A Comprehensive Review by Gerardo Antonio Castañón Ávila, Walter Cerroni, Ana Maria Sarmiento-Moncada

    Published 2025-07-01
    “…Fog computing, with its edge-focused processing and analytics, benefits from the compactness and low latency of integrated photonics for real-time signal processing, sensing, and secure data transmission near IoT devices. PICs also facilitate the low-loss, high-speed modulation, transmission, and detection of RF signals in scalable Radio-over-Fiber (RoF) links, enabling seamless IoT integration with Cloud and Fog networks. …”
    Get full text
    Article
  6. 26

    Design and development of full self-service smart shopping system for unmanned supermarket by Xiao Liang, Yu Qi, Shuo Xi, Guanglei Meng, Zhujun Wang

    Published 2025-08-01
    “…To address these issues, this study proposes a fully self-service smart shopping system, comprising three key modules: a smart shopping cart, a client app, and a back-end management platform, with full-chain encryption using TLS (Transport Layer Security) and RSA (Rivest Shamir Adleman) to ensure secure data transmission. The smart shopping system utilizes a KNN (K Nearest Neighbor) collaborative filtering recommendation algorithm to improve the relevance and accuracy of product suggestions. …”
    Get full text
    Article
  7. 27

    pycastx: A Python library for lightweight data encryption in IoT using ECC and metaheuristics based high-entropy keys and dynamic S-Box by Salman Ali, Md Asdaque Hussain, Faisal Anwer, Ahwar Khan, Mohd Irfan Alam

    Published 2025-09-01
    “…This work narrows the gap between theoretical cryptography and its practical implementation, providing a comprehensive solution for secure data transmission in modern communication systems.…”
    Get full text
    Article
  8. 28

    Enhancing IoT security with a DNA-based lightweight cryptography system by Sehrish Aqeel, Adnan Shahid Khan, Irshad Ahmed Abbasi, Fahad Algarni, Daniel Grzonka

    Published 2025-04-01
    “…The research explains how DNA-LWCS (DNA-based lightweight cryptography system) utilizes basic encryption methods to secure data transmission against system complexity while maintaining security effectiveness. …”
    Get full text
    Article
  9. 29

    Huffman coding-based data reduction and quadristego logic for secure image steganography by Irsyad Fikriansyah Ramadhan, Ntivuguruzwa Jean De La Croix, Tohari Ahmad, Andre Uzamurengera

    Published 2025-05-01
    “…Ensuring secure data transmission is critical for maintaining confidentiality and has become increasingly important. …”
    Get full text
    Article
  10. 30

    qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era by Hyoungsub Shim, Bongho Kang, Haejung Im, Duhyun Jeon, Seok-Min Kim

    Published 2025-01-01
    “…This paper details the design, implementation, and performance evaluation of qTrustNet VPN, showcasing its potential to secure data transmission against emerging quantum threats.…”
    Get full text
    Article
  11. 31

    Secure Cooperative Dual-RIS-Aided V2V Communication: An Evolutionary Transformer–GRU Framework for Secrecy Rate Maximization in Vehicular Networks by Elnaz Bashir, Francisco Hernando-Gallego, Diego Martín, Farzaneh Shoushtari

    Published 2025-07-01
    “…In this paper, we investigate the problem of secrecy rate maximization in a cooperative dual-RIS-aided V2V communication network, where two cascaded RISs are deployed to collaboratively assist with secure data transmission between mobile vehicular nodes in the presence of eavesdroppers. …”
    Get full text
    Article
  12. 32

    A secure hybrid deep learning framework for brain tumor detection and classification by Sandeep Kumar Mathivanan, Saravanan Srinivasan, Manjula Sanjay Koti, Virendra Singh Kushwah, Rose Bindu Joseph, Mohd Asif Shah

    Published 2025-03-01
    “…The method aims to enhance image quality, ensure secure data transmission, and achieve highly accurate classification of brain tumors while addressing challenges related to manual interpretation and data security. …”
    Get full text
    Article
  13. 33

    From hospital to home: a comprehensive platform supporting cardiac rehabilitation post-revascularization by Samaneh Bakhshayesh, Arash Gholoobi, Khadijeh Moulaei, Farnaz Khoshrounejad, Mohammad Reza Mazaheri Habibi, Zahra Ebnehoseini, Majd Jangi, Saeid Eslami

    Published 2025-07-01
    “…., exercise animations, CPR tutorials), and secure data transmission. Then, in this phase, think-aloud protocols (n = 18 patients) and heuristic evaluation (n = 5 HCI experts) were employed for usability testing. …”
    Get full text
    Article
  14. 34

    Research Framework and Anticipated Results of Key Technologies for Distributed Certificate-less Network Identity Systems by ZHANG Xiaosong, CAO Sheng, LU Tianbo, YANG Kun, GUI Xun, XIE Guotao, NIU Weina

    Published 2025-05-01
    “…In certificate-less distributed key management, smart contract-based key management schemes and multi-party attack-resistant key agreement protocols were developed, achieving breakthroughs in distributed key generation and anonymous secure data transmission. In hardware-enhanced high-parallel distributed terminal access, optimized acceleration schemes for IoT nodes and secure integration of heterogeneous terminals were designed, achieving authentication hash computing speeds of up to 200 Gbit/s and IoT authentication traffic handling of up to 100 Gbit/s. …”
    Get full text
    Article
  15. 35

    Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks by Hua Yi Lin

    Published 2022-12-01
    “…In addition, only a few group key agreements are integrated into secure data transmissions. Therefore, a key agreement using the hierarchy-based cluster elliptic curve key agreement named HCECKA is proposed in this study to deal with secure data transmissions in wireless sensor networks. …”
    Get full text
    Article
  16. 36

    On the Firmness Code Noising to the Statistical Analysis of the Observable Data of Repeated Repetition by V. M. Deundyak, J. V. Kosolapov

    Published 2015-02-01
    “…We give a structural description of the model of secured data transmission and construct an information analytical model of the observer. …”
    Get full text
    Article
  17. 37

    FPGA-Based Implementation of an Underwater Quantum Key Distribution System With BB84 Protocol by Burak Kebapci, Vecdi Emre Levent, Sude Ergin, Gorkem Mutlu, Ibrahim Baglica, Anilcan Tosun, Pietro Paglierani, Konstantinos Pelekanakis, Roberto Petroccia, Joao Alves, Murat Uysal

    Published 2023-01-01
    “…As threats in the maritime domain diversify, securing data transmission becomes critical for underwater wireless networks designed for the surveillance of critical infrastructure and maritime border protection. …”
    Get full text
    Article
  18. 38

    Low power IoT device communication through hybrid AES-RSA encryption in MRA mode by Qiang Chang, Tianqi Ma, Wenzhong Yang

    Published 2025-04-01
    “…This fusion approach leverages the strengths of both algorithms, encrypting the AES key using the improved RSA algorithm to bolster data security while maintaining efficient transmission.Performance evaluations of the RSA-AES hybrid algorithm demonstrate its exceptional capability in securing data transmission within edge scenarios,and the security of this hybrid algorithm is analyzed. …”
    Get full text
    Article