Filters








425,314 Hits in 6.3 sec

Design of Advadvanced Encryption Standard (AES) Based Rijindael Algorithm

J. Aarthi
2014 International Journal of MC Square Scientific Research  
The enhanced mix column is produce the efficient Area, Delay and Power(ADP) products for the both encryption and decryptions.  ...  To provide the efficient logical elements for the mix column, the enhanced inverse mix column is proposed in this paper.  ...  The proposed design is provide 17% reduction of the slices and LUTs and 3% of the delay and efficient power consumptions.  ... 
doi:10.20894/ijmsr.117.006.001.005 fatcat:mrskkqdewbbhhnohnlwf7cdl7i

Efficient Elliptic Curve Cryptography using Glowworm Search Optimization Algorithm

2019 Journal of Networking and Communication Systems (JNACS)  
With the emergence of the Internet of Things (IoT), the medical and healthcare systems experiencing the copious growth by utilizing the efficiency of IoT systems in terms of remote, non-invasive and persistent  ...  In this paper, the security of the patient data stored in IoT devices is analyzed using the renowned cryptography technique by employing the efficiency of optimization approaches.  ...  From the simulation analysis, this model obtained improved confidentiality and security and also enhanced performance in terms of minimized fast computing and efficiency.  ... 
doi:10.46253/jnacs.v2i1.a2 fatcat:5n3n35m3trdxbhphq2nhfjznhi

The Design of Secure and Efficient P2PSIP Communication Systems [chapter]

Xianghan Zheng, Vladimir Oleshchuk
2010 Lecture Notes in Computer Science  
The proposed approach includes three-layer hierarchical overlay division, peer identifier assignment, cache based efficiency enhancement, proxy based security, and subjective logic based trust enhancement  ...  In this paper, we propose a system architecture for constructing efficient and secure P2PSIP communication systems.  ...  The proposed approaches include: three layer hierarchical overlay division, peer identifier assignment, cache based efficiency enhancement, proxy based security, and subjective logic based trust enhancement  ... 
doi:10.1007/978-3-642-12368-9_20 fatcat:nuo6wddbdbfehgenhx4od47k5u

Intelligent Chimp Metaheuristics Optimization with Data Encryption Protocol for WSN

P. Manjula, Dr. S. Baghavathi Priya
2022 Intelligent Automation and Soft Computing  
The resultant experimental values highlighted the superior performance of the IMEAC-DEP model over the recent stage of art methods interms of energy efficiency as well as security.  ...  Since WSN is mostly deployed in harsh and inaccessible environments, it is necessary to design energy efficient and security solutions.  ...  The key distribution technique is depending on preceding data for generating dynamic keys and doesn't need sharing phase and secure channel that enhances the energy efficiency, security and decreases memory  ... 
doi:10.32604/iasc.2022.020969 fatcat:ix4zzaaw7fck3h7yxpqhl7eu4a

Secure Data Aggregation Scheme for IOT Applications in Cloud

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Enhanced P-Gene scheme ensures secure transmission and storage of private data by relying on a data aggregation scheme fully dependent on erasable data hiding technique.  ...  by the cloud computing effectively reducing the cost overheadamong the cloud users.The major concerns of IoT infrastructure are reliability, performance, security and privacy.  ...  Zhitao Guan et al. proposed device oriented efficient and secure in the cloud environment[5].  ... 
doi:10.35940/ijitee.d1017.0394s220 fatcat:g7r2cefikzh4llynhnu3glcnwm

An Efficient Approach for Enhancing the Security of Amazigh Text using Binary Tree

Fatima Amounas
2016 International Journal of Computer Applications Technology and Research  
This paper contributes in the area of elliptic curve cryptography by encrypting data using matrix approach and using the concept of tree traversal method for enhancing the security of the encrypted points  ...  The main of our research is to develop a novel Approach for enhancing the security of Amazigh Text using binary tree. The plaintext considered is the combination of Unicode characters.  ...  In this paper, a new efficient approach has been proposed to improve the ECC cryptosystem based matrix. The main contribution is to enhance the security of the proposed method using binary tree.  ... 
doi:10.7753/ijcatr0509.1004 fatcat:uh3qhui3erdtjhr3momwyubygy

AN ENHANCED AND COST EFFECTIVE GROUP KEY MANAGEMENT SCHEME FOR MULTICAST NETWORK

Muthusamy
2013 Journal of Computer Science  
Key management plays a vital role in the data communications. The proposed scheme is a key management scheme that provides more efficient and secure methods for key generation and utilization.  ...  Enhanced and cost effective key management scheme achieves a secure communication between the members within the group-based network.  ...  to M and private key is (a, b, d, φ(M)), where d is the part of private key of KGC/GC and is equal to e −1 mod φ(M).  ... 
doi:10.3844/jcssp.2013.477.487 fatcat:7lwfttcp65hrdi6nrulpdjtua4

An Introduction to Digital Signature Schemes [article]

Mehran Alidoost Nia, Ali Sajedi, Aryo Jamshidpey
2014 arXiv   pre-print
In this paper, different types of schemes are compared based on security level, efficiency, difficulty of algorithm and so on.  ...  Today, all types of digital signature schemes emphasis on secure and best verification methods.  ...  D. Proxy Scheme This scheme is classified on Enhanced Signing and Verification Capabilities. [1] Gives privilege of signing to another person that signer trusts him.  ... 
arXiv:1404.2820v1 fatcat:j74oe4iaxjc2zlv7wlknejetgu

Enhanced Chosen-Ciphertext Security and Applications [chapter]

Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill
2014 Lecture Notes in Computer Science  
We introduce and study a new notion of enhanced chosenciphertext security (ECCA) for public-key encryption.  ...  Our study of ECCA security is largely motivated by the related concept of randomness-recovering (RR) encryption, in which case the randomness-recovery algorithm is efficient.  ...  The fourth author was supported by NSF grants CNS-1012910 and CNS-0546614.  ... 
doi:10.1007/978-3-642-54631-0_19 fatcat:rn24bxdhjvfibjmb54btwnpk4u

A Hybrid-Security Model for Privacy-Enhanced Distributed Data Mining

Tanzeela Javid, Manoj Kumar Gupta, Abhishek Gupta
2020 Journal of King Saud University: Computer and Information Sciences  
The trivial data mining techniques, such as k-means clustering technique and naïve Bayes classification technique, verifies the efficiency and accuracy of the hybrid security model.  ...  the working of the hybrid security model.  ...  Declaration of Competing Interest The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper  ... 
doi:10.1016/j.jksuci.2020.06.010 fatcat:sgqisg4yd5bvpkcqt5b6dyxyhi

An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy

Min-Shiang Hwang
1999 Computers and Mathematics with Applications  
We also propose two schemes which are a slight modification of the proposed scheme to enhance the level of security.  ...  This paper shows how several security classes in Liaw-Wang-Lei's cryptographic key assignment scheme can collaborate to derive the secret key of their immediate ancestor in some cases.  ...  The proposed schemes not only retain the advantages of Liaw-Wang-Lei's scheme but also enhance the security. 3 . 3 Substitute NPl(t214) and NP1(t215) into the one-way function (F(X) = X 2 + 1 mod 13) with  ... 
doi:10.1016/s0898-1221(99)00042-5 fatcat:jf7f5eryl5f5ng52d4qo5lhm2a

On the security of a secure Lempel-Ziv-Welch (LZW) algorithm

Shujun Li, Chengqing Li, Jay C.-C. Kuo
2011 2011 IEEE International Conference on Multimedia and Expo  
The complexity of the chosen-plaintext attack is O(M L), where M is the number of chosen plaintexts and L is the size of the ciphertext.  ...  Finally we propose several enhancements to the secure LZW algorithm under study.  ...  According to the description of the secure LZW algorithm, we have B i = D i (S i ) ⊕ K i and B * i = D * i (S * i ) ⊕ K i .  ... 
doi:10.1109/icme.2011.6011939 dblp:conf/icmcs/LiLK11 fatcat:nspds5vcpjdwbph3m6nyamiuqe

Energy Efficient and Secured Data Dissemination in Wsn

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In most of the existing systems, providing energy efficient secured data dissemination is a major concern.  ...  The configuration parameters of the nodes are updated by means of reprogramming and reconfiguration through over air programming.  ...  Sruthi K et.al [7] have proposed a secure and distributed data dissemination protocol that can be used for the secure and efficient dissemination of data in wireless sensor networks.  ... 
doi:10.35940/ijitee.b6306.129219 fatcat:xgbtcjoccvbuznlcwi6453qgwa

Performance Evaluation of Enhancedgreedy-Two-Phase Deployment Algorithm

Kartit Ali
2013 International journal of network security and its applications  
Much research has already addressed the conflict detection of policies and optimization, but in our paper we will focus on researches that talk about strategies for the security of policy deployment, some  ...  We show that the proposed solution is most efficient.  ...  (B,5) ; R4= L-C-E-M-B t=6 ; T(t)=D ins(D,6) ; R5= L-C-E-M-B-D t=7 ; T(t)=F ins(F,7) ; R6= L-C-E-M-B-D-F t=8 ; T(t)=K ins (K,8) ; R7= L-C-E-M-B-D-F-K Figure 1 . 1 Comparison of Enhanced-Greedy-2-PhaseDeployment  ... 
doi:10.5121/ijnsa.2013.5412 fatcat:umzm3ywcyjcybhmaflimxpyahy

Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data [chapter]

Ling Chen, Ting Yu, Rada Chirkova
2016 Lecture Notes in Computer Science  
We analyze in detail the efficiency of each of the proposed protocols as well as their privacy guarantees.  ...  We adopt the classical honest-but-curious attack model, and design a suite of efficient protocols for skyline queries over horizontally partitioned data.  ...  The insight of HP.3 is to replace the secure evaluation of the product n i=1 (Z ′′ i − U ′ i ) in HP.2 with the secure computation of Algorithm 3 3 Alternative Enhanced Secure 1-to-N Skyline Dominance  ... 
doi:10.1007/978-3-319-45931-8_12 fatcat:wzja6fxbprgezj6a2acz2c7xgi
« Previous Showing results 1 — 15 out of 425,314 results