Showing 1 - 20 results of 22 for search '(("secure data transmission") OR ("secure data transition"))', query time: 0.10s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Optimal path selection and secured data transmission in underwater acoustic sensor networks: LSTM-based energy prediction. by Sathish Kaveripakam, Ravikumar Chinthaginjala

    Published 2023-01-01
    “…To overcome this issue, this paper intends to propose a model for optimal path selection and secured data transmission in UASN via Long Short-Term Memory (LSTM) based energy prediction. …”
    Get full text
    Article
  5. 5
  6. 6

    An improved lightweight certificateless generalized signcryption scheme for mobile-health system by Caixue Zhou

    Published 2019-01-01
    “…Based on our scheme, the same lightweight secure data transmission protocol for the mobile-health system can also be constructed, just like the one based on the original scheme.…”
    Get full text
    Article
  7. 7

    A New Key Delivery Method in Wireless Network by Çağatay Ay

    Published 2017-01-01
    “…Due to this reason, the methods and techniques developed for secure data transmission gain importance. Steganography, one of these techniques, can be described as one of the subdivisions of information concealment, which makes data linkage to a carrier that seems harmless for occult communication. …”
    Get full text
    Article
  8. 8

    A Hybrid Chinese National Cryptographic Algorithm Based Solution for Data Encryption and Decryption in Transmission by WANG Jinquan, DENG Jian, HE Hongjie

    Published 2023-08-01
    “…To ensure the security of the transmitted data, this paper proposes a secure data transmission solution based on the application scenario of in-vehicle status data transmission, combining the features of chinese national cryptographic algorithms SM4 and SM9.This solution utilizes SM4 to achieve fast encryption of the plaintext in-vehicle status data, ensuring the confidentiality, integrity, resistance to attacks, and resistance to interference of the data. …”
    Get full text
    Article
  9. 9

    Artificial Intelligence in Quantum Communications: A Comprehensive Survey by Istiak Mahmud, Ahmed Abdelhadi

    Published 2025-01-01
    “…The integration of Artificial Intelligence (AI) into the field of quantum communication has emerged in recent years as a promising avenue for enhancing secure data transmission, error correction, and scalability in quantum networks. …”
    Get full text
    Article
  10. 10

    RSA based encryption approach for preserving confidentiality of big data by Kanika Sharma, Alka Agrawal, Dhirendra Pandey, R.A. Khan, Shail Kumar Dinkar

    Published 2022-05-01
    “…To different from previous works in secure data transmission, the authors focus on the data owner and divide users into several domains in SHI, which greatly decrease the key management complexity for data owners and users. …”
    Get full text
    Article
  11. 11

    Enhanced secure and efficient routing algorithm for optimal multimedia data transmission by Bhalia Mayur Natwarlal, Bavarva Arjav Ambaram

    Published 2025-01-01
    “…Wireless Multimedia Sensor Networks (WMSNs) are critical for various applications requiring reliable and secure data transmission. Enhancing routing protocols in WMSNs is essential to improve performance and security. …”
    Get full text
    Article
  12. 12

    A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption by Mohamed Elhoseny, Hamdy Elminir, Alaa Riad, Xiaohui Yuan

    Published 2016-07-01
    “…In this paper, we propose a novel encryption schema based on Elliptic Curve Cryptography (ECC) and homomorphic encryption to secure data transmission in WSN. The proposed encryption schema is built upon GASONeC algorithm (Elhoseny et al., 2014) that uses genetic algorithm to build the optimum network structure in the form of clusters. …”
    Get full text
    Article
  13. 13

    OpticalTrust: A Sensor-to-Blockchain Framework Using Free-Space Optical Communication by Parveen Bajaj, Aman Kataria, Vikram Puri, Sachin Gupta, Hong Min

    Published 2024-12-01
    “…In the dynamic landscape of the tech industry, the escalating requirement for swift and secure data transmission has catalyzed innovation in integrated communication systems. …”
    Get full text
    Article
  14. 14

    Exploring Dynamics and Hardware Implementation of an Enhanced 5D Hyperchaotic Memristive System Inspired by Sprott-C System by Abdulmajeed Abdullah Mohammed Mokbel, Fei Yu, Yumba Musoya Gracia, Bohong Tan, Hairong Lin, Herbert Ho-Ching Iu

    Published 2025-03-01
    “…To this respect, detailed mathematical modeling and numerical simulations about the stability of the system’s equilibria, bifurcations, and hyperchaotic dynamics were conducted and showed a very wide variety of behaviors of great potential in cryptographic applications and secure data transmission. Then, the flexibility and efficiency of the real-time operating environment were demonstrated, and the system was actually implemented on a field-programmable gate array (FPGA) hardware platform. …”
    Get full text
    Article
  15. 15

    Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm by Sanjay Kumar, Deepmala Sharma

    Published 2023-12-01
    “…Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes. …”
    Get full text
    Article
  16. 16

    Design and development of full self-service smart shopping system for unmanned supermarket by Xiao Liang, Yu Qi, Shuo Xi, Guanglei Meng, Zhujun Wang

    Published 2025-08-01
    “…To address these issues, this study proposes a fully self-service smart shopping system, comprising three key modules: a smart shopping cart, a client app, and a back-end management platform, with full-chain encryption using TLS (Transport Layer Security) and RSA (Rivest Shamir Adleman) to ensure secure data transmission. The smart shopping system utilizes a KNN (K Nearest Neighbor) collaborative filtering recommendation algorithm to improve the relevance and accuracy of product suggestions. …”
    Get full text
    Article
  17. 17

    pycastx: A Python library for lightweight data encryption in IoT using ECC and metaheuristics based high-entropy keys and dynamic S-Box by Salman Ali, Md Asdaque Hussain, Faisal Anwer, Ahwar Khan, Mohd Irfan Alam

    Published 2025-09-01
    “…This work narrows the gap between theoretical cryptography and its practical implementation, providing a comprehensive solution for secure data transmission in modern communication systems.…”
    Get full text
    Article
  18. 18

    A secure hybrid deep learning framework for brain tumor detection and classification by Sandeep Kumar Mathivanan, Saravanan Srinivasan, Manjula Sanjay Koti, Virendra Singh Kushwah, Rose Bindu Joseph, Mohd Asif Shah

    Published 2025-03-01
    “…The method aims to enhance image quality, ensure secure data transmission, and achieve highly accurate classification of brain tumors while addressing challenges related to manual interpretation and data security. …”
    Get full text
    Article
  19. 19

    Research Framework and Anticipated Results of Key Technologies for Distributed Certificate-less Network Identity Systems by ZHANG Xiaosong, CAO Sheng, LU Tianbo, YANG Kun, GUI Xun, XIE Guotao, NIU Weina

    Published 2025-05-01
    “…In certificate-less distributed key management, smart contract-based key management schemes and multi-party attack-resistant key agreement protocols were developed, achieving breakthroughs in distributed key generation and anonymous secure data transmission. In hardware-enhanced high-parallel distributed terminal access, optimized acceleration schemes for IoT nodes and secure integration of heterogeneous terminals were designed, achieving authentication hash computing speeds of up to 200 Gbit/s and IoT authentication traffic handling of up to 100 Gbit/s. …”
    Get full text
    Article
  20. 20

    Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks by Hua Yi Lin

    Published 2022-12-01
    “…In addition, only a few group key agreements are integrated into secure data transmissions. Therefore, a key agreement using the hierarchy-based cluster elliptic curve key agreement named HCECKA is proposed in this study to deal with secure data transmissions in wireless sensor networks. …”
    Get full text
    Article