-
1
Secure data transmission through fractal-based cryptosystem: a Noor iteration approach
Published 2025-07-01Get full text
Article -
2
Analysis of different IDS-based machine learning models for secure data transmission in IoT networks
Published 2025-07-01Get full text
Article -
3
F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs
Published 2017-07-01Get full text
Article -
4
Optimal path selection and secured data transmission in underwater acoustic sensor networks: LSTM-based energy prediction.
Published 2023-01-01“…To overcome this issue, this paper intends to propose a model for optimal path selection and secured data transmission in UASN via Long Short-Term Memory (LSTM) based energy prediction. …”
Get full text
Article -
5
-
6
An improved lightweight certificateless generalized signcryption scheme for mobile-health system
Published 2019-01-01“…Based on our scheme, the same lightweight secure data transmission protocol for the mobile-health system can also be constructed, just like the one based on the original scheme.…”
Get full text
Article -
7
A New Key Delivery Method in Wireless Network
Published 2017-01-01“…Due to this reason, the methods and techniques developed for secure data transmission gain importance. Steganography, one of these techniques, can be described as one of the subdivisions of information concealment, which makes data linkage to a carrier that seems harmless for occult communication. …”
Get full text
Article -
8
A Hybrid Chinese National Cryptographic Algorithm Based Solution for Data Encryption and Decryption in Transmission
Published 2023-08-01“…To ensure the security of the transmitted data, this paper proposes a secure data transmission solution based on the application scenario of in-vehicle status data transmission, combining the features of chinese national cryptographic algorithms SM4 and SM9.This solution utilizes SM4 to achieve fast encryption of the plaintext in-vehicle status data, ensuring the confidentiality, integrity, resistance to attacks, and resistance to interference of the data. …”
Get full text
Article -
9
Artificial Intelligence in Quantum Communications: A Comprehensive Survey
Published 2025-01-01“…The integration of Artificial Intelligence (AI) into the field of quantum communication has emerged in recent years as a promising avenue for enhancing secure data transmission, error correction, and scalability in quantum networks. …”
Get full text
Article -
10
RSA based encryption approach for preserving confidentiality of big data
Published 2022-05-01“…To different from previous works in secure data transmission, the authors focus on the data owner and divide users into several domains in SHI, which greatly decrease the key management complexity for data owners and users. …”
Get full text
Article -
11
Enhanced secure and efficient routing algorithm for optimal multimedia data transmission
Published 2025-01-01“…Wireless Multimedia Sensor Networks (WMSNs) are critical for various applications requiring reliable and secure data transmission. Enhancing routing protocols in WMSNs is essential to improve performance and security. …”
Get full text
Article -
12
A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption
Published 2016-07-01“…In this paper, we propose a novel encryption schema based on Elliptic Curve Cryptography (ECC) and homomorphic encryption to secure data transmission in WSN. The proposed encryption schema is built upon GASONeC algorithm (Elhoseny et al., 2014) that uses genetic algorithm to build the optimum network structure in the form of clusters. …”
Get full text
Article -
13
OpticalTrust: A Sensor-to-Blockchain Framework Using Free-Space Optical Communication
Published 2024-12-01“…In the dynamic landscape of the tech industry, the escalating requirement for swift and secure data transmission has catalyzed innovation in integrated communication systems. …”
Get full text
Article -
14
Exploring Dynamics and Hardware Implementation of an Enhanced 5D Hyperchaotic Memristive System Inspired by Sprott-C System
Published 2025-03-01“…To this respect, detailed mathematical modeling and numerical simulations about the stability of the system’s equilibria, bifurcations, and hyperchaotic dynamics were conducted and showed a very wide variety of behaviors of great potential in cryptographic applications and secure data transmission. Then, the flexibility and efficiency of the real-time operating environment were demonstrated, and the system was actually implemented on a field-programmable gate array (FPGA) hardware platform. …”
Get full text
Article -
15
Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm
Published 2023-12-01“…Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes. …”
Get full text
Article -
16
Design and development of full self-service smart shopping system for unmanned supermarket
Published 2025-08-01“…To address these issues, this study proposes a fully self-service smart shopping system, comprising three key modules: a smart shopping cart, a client app, and a back-end management platform, with full-chain encryption using TLS (Transport Layer Security) and RSA (Rivest Shamir Adleman) to ensure secure data transmission. The smart shopping system utilizes a KNN (K Nearest Neighbor) collaborative filtering recommendation algorithm to improve the relevance and accuracy of product suggestions. …”
Get full text
Article -
17
pycastx: A Python library for lightweight data encryption in IoT using ECC and metaheuristics based high-entropy keys and dynamic S-Box
Published 2025-09-01“…This work narrows the gap between theoretical cryptography and its practical implementation, providing a comprehensive solution for secure data transmission in modern communication systems.…”
Get full text
Article -
18
A secure hybrid deep learning framework for brain tumor detection and classification
Published 2025-03-01“…The method aims to enhance image quality, ensure secure data transmission, and achieve highly accurate classification of brain tumors while addressing challenges related to manual interpretation and data security. …”
Get full text
Article -
19
Research Framework and Anticipated Results of Key Technologies for Distributed Certificate-less Network Identity Systems
Published 2025-05-01“…In certificate-less distributed key management, smart contract-based key management schemes and multi-party attack-resistant key agreement protocols were developed, achieving breakthroughs in distributed key generation and anonymous secure data transmission. In hardware-enhanced high-parallel distributed terminal access, optimized acceleration schemes for IoT nodes and secure integration of heterogeneous terminals were designed, achieving authentication hash computing speeds of up to 200 Gbit/s and IoT authentication traffic handling of up to 100 Gbit/s. …”
Get full text
Article -
20
Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks
Published 2022-12-01“…In addition, only a few group key agreements are integrated into secure data transmissions. Therefore, a key agreement using the hierarchy-based cluster elliptic curve key agreement named HCECKA is proposed in this study to deal with secure data transmissions in wireless sensor networks. …”
Get full text
Article