Search

Your search keyword '"DATA encryption"' showing total 126 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal sensors (14248220) Remove constraint Journal: sensors (14248220)
126 results on '"DATA encryption"'

Search Results

1. IOTA-Based Distributed Ledger in the Mining Industry: Efficiency, Sustainability and Transparency.

2. Field-Programmable Gate Array-Based Implementation of Zero-Trust Stream Data Encryption for Enabling 6G-Narrowband Internet of Things Massive Device Access.

3. End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption.

4. Strengthening Privacy and Data Security in Biomedical Microelectromechanical Systems by IoT Communication Security and Protection in Smart Healthcare.

5. A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol.

6. Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm.

7. A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic.

8. Secure Data Aggregation Based on End-to-End Homomorphic Encryption in IoT-Based Wireless Sensor Networks.

9. Optimal ElGamal Encryption with Hybrid Deep-Learning-Based Classification on Secure Internet of Things Environment.

10. A Novel Cipher-Based Data Encryption with Galois Field Theory.

11. Swarm Intelligence in Internet of Medical Things: A Review.

12. Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine.

13. A Blockchain-Based End-to-End Data Protection Model for Personal Health Records Sharing: A Fully Homomorphic Encryption Approach.

14. BBNSF: Blockchain-Based Novel Secure Framework Using RP 2 -RSA and ASR-ANN Technique for IoT Enabled Healthcare Systems.

15. AES Based White Box Cryptography in Digital Signature Verification.

16. Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices.

17. Secure Vehicular Platoon Management against Sybil Attacks.

18. Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach.

19. Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries.

20. 5G-BSS: 5G-Based Universal Blockchain Smart Sensors.

21. Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids.

22. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

23. VLSI Design of Trusted Virtual Sensors.

24. Analysis of an ABE Scheme with Verifiable Outsourced Decryption.

25. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.

26. EPPRD: An Efficient Privacy-Preserving Power Requirement and Distribution Aggregation Scheme for a Smart Grid.

27. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.

28. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.

29. RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks.

30. Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks.

31. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.

32. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

33. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

34. Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.

35. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

36. A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs.

37. Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks.

38. Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips.

39. Lightweight Security Transmission in Wireless Sensor Networks through Information Hiding and Data Flipping.

40. In Situ Femtosecond-Laser-Induced Fluorophores on Surface of Polyvinyl Alcohol for H 2 O/Co 2+ Sensing and Data Security.

41. Privacy-Preserving and Lightweight Selective Aggregation with Fault-Tolerance for Edge Computing-Enhanced IoT.

42. A Two-Layer IP Hopping-Based Moving Target Defense Approach to Enhancing the Security of Mobile Ad-Hoc Networks.

43. Recent Advances in Noninvasive Biosensors for Forensics, Biometrics, and Cybersecurity.

44. A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments.

45. A Study on CP-ABE-Based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment.

46. Quantifying the Computational Efficiency of Compressive Sensing in Smart Water Network Infrastructures.

47. A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing.

48. A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.

49. Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks.

50. UHF RFID Prototyping Platform for ISO 29167 Decryption Based on an SDR.

Catalog

Books, media, physical & digital resources