Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Probabilistic data encryption.

Статті в журналах з теми "Probabilistic data encryption"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Probabilistic data encryption".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

N., V. V. Satyanarayana, M. S. V. Ravi Kumar J., Babu Reddy M., Leelavathi N., and Sujatha B. "A Symmetric Searchable Encryption Identification of Data on Probabilistic Trapdoors." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 3880–83. https://doi.org/10.35940/ijeat.C6389.029320.

Повний текст джерела
Анотація:
Accessible Encryption (SE) permits a client in accordance with transfer records in accordance with the astronaut and according to seem thru it of a faraway manner while defending the security concerning each the statistics yet the inquiries. Right now, entrust a generative then the simple in imitation of actualize Symmetric Searchable Encryption Scheme because instance (SSE) [4]. This tale takes the some round concerning correspondence namely O(n) instances on calculations upstairs n range regarding records . We likewise presented some other variety of Search Pattern Privacy, as gives a percen
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Mazumder, Rashed, Atsuko Miyaji, and Chunhua Su. "Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data." International Journal of Foundations of Computer Science 28, no. 06 (2017): 661–82. http://dx.doi.org/10.1142/s0129054117400123.

Повний текст джерела
Анотація:
Security, privacy and data integrity are the critical issues in Big Data application of IoT-enable environment and cloud-based services. There are many upcoming challenges to establish secure computations for Big Data applications. Authenticated encryption (AE) plays one of the core roles for Big Data’s confidentiality, integrity, and real-time security. However, many proposals exist in the research area of authenticated encryption. Generally, there are two concepts of nonce respect and nonce reuse under the security notion of the AE. However, recent studies show that nonce reuse needs to sacr
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Korchynskyi, Volodymyr, Valerii Hordiichuk, Vitalii Kildishev, Oleksandr Riabukha, Sergii Staikutsa, and Khaled Alfaiomi. "Method of information protection based on the integration of probabilistic encryption and noise immune coding." Radioelectronic and Computer Systems, no. 4 (December 6, 2023): 184–95. http://dx.doi.org/10.32620/reks.2023.4.13.

Повний текст джерела
Анотація:
The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data. The goal is to develop a multi-stage method for protecting information from unauthorized access, based on probabilistic encryption integration, error-correcting code, and error decorrelation. The tasks to be solved are as follows: to develop a probabilistic encryption algorithm that considers the entropy of the characters’ appearance in a message; to implement iterative coding with variable paramete
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Aruna, M. G., and K. G. Mohan. "Secured cloud data migration technique by competent probabilistic public key encryption." China Communications 17, no. 5 (2020): 168–90. http://dx.doi.org/10.23919/jcc.2020.05.014.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid probabilistic triple encryption approach for data security in cloud computing." International Journal of Advanced Intelligence Paradigms 21, no. 1/2 (2022): 158. http://dx.doi.org/10.1504/ijaip.2022.121035.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Leung, K. C., S. L. Li, L. M. Cheng, and C. K. Chan. "A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion." Neural Processing Letters 24, no. 2 (2006): 93–105. http://dx.doi.org/10.1007/s11063-006-9006-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Zhu, Li Juan. "A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA." Applied Mechanics and Materials 241-244 (December 2012): 2471–74. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2471.

Повний текст джерела
Анотація:
Security transaction problem between the client and the server was solved by a network identity authentication protocol of this paper. We designed this protocol from two aspects, one is the hardware structure design, and the other is data encryption. We used fingerprint sensor to gather the user’s fingerprint and characteristic value instead of password input from keyboard, and used RSA probabilistic encryption to generate public key and private key of the client and public key and private key of the server, and then used the protocol certification process to finish operation of the data encry
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Bystrevskii, Sergey A., Aleksei E. Borshevnikov, and Yuri V. Dobrzhinsky. "Data verification protocol for a confidential computing scheme with homomorphic encryption." Proceedings of Tomsk State University of Control Systems and Radioelectronics 27, no. 2 (2024): 31–36. http://dx.doi.org/10.21293/1818-0442-2024-27-2-31-36.

Повний текст джерела
Анотація:
Auction trading systems and Big Data technologies play an important role in modern society. However, as soon as these technologies deal with the finances of their users, there is a need to implement security systems in them to ensure the possibility of data verification. The article proposes a data verification protocol based on the use of homomorphic encryption. A formal safety assessment of the developed protocol is shown, and an analysis from a probabilistic standpoint is carried out.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Kulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid Probabilistic Triple Encryption (HPRRA) Approach for Data Security in Cloud Computing." International Journal of Advanced Intelligence Paradigms 1, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijaip.2021.10036005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

De, Mello Flavio, and José A. M. Xexéo. "Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence." JUCS - Journal of Universal Computer Science 24, no. (1) (2018): 25–42. https://doi.org/10.3217/jucs-024-01-0025.

Повний текст джерела
Анотація:
This paper analyzes the use of machine learning techniques for the identification of encryption algorithms, from ciphertexts only. The experiment involved corpora of plain texts in seven different languages; seven encryption algorithms, each one in ECB and CBC modes; and six data mining algorithms for classification. The plain text files were encrypted with each cryptographic algorithm under both cipher modes. After that, the ciphertexts were processed to produce metadata, which were then used by the classification algorithms. The overall experiment involved not only a high quantity of ciphert
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Zhang, Jing-Wen, Xiu-Bo Chen, Gang Xu, and Yi-Xian Yang. "Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*." Chinese Physics B 30, no. 7 (2021): 070309. http://dx.doi.org/10.1088/1674-1056/ac003b.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Luna, Jose Marcio, Chaouki T. Abdallah, and Gregory L. Heileman. "Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud." IEEE Transactions on Cloud Computing 6, no. 2 (2018): 428–39. http://dx.doi.org/10.1109/tcc.2016.2543728.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Ranadheer Reddy, Vallem. "SECURE DATA TRANSFER AND DETECTION FROM COUNTING BLOOM FILTER IN CLOUD COMPUTING." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem03096.

Повний текст джерела
Анотація:
ABSTRACT: As cloud computing continues to play a pivotal role in data storage and processing, ensuring the security and integrity of transferred data remains a critical concern. This project introduces a novel approach for secure data transfer and detection leveraging the Counting Bloom Filter in cloud computing environments. The proposed system addresses the vulnerabilities associated with traditional data transfer methods by incorporating the Counting Bloom Filter, a probabilistic data structure. This technology aids in optimizing storage efficiency and enhances the accuracy of data detectio
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Gandhi, Mehak, and Kiranbir Kaur. "Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption." International Journal of Computer Sciences and Engineering 6, no. 3 (2018): 263–68. http://dx.doi.org/10.26438/ijcse/v6i3.263268.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Wei, Hong Ru, and Ya Fei Zheng. "Algebraic Techniques in Linear Cryptanalysis." Advanced Materials Research 756-759 (September 2013): 3634–39. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3634.

Повний текст джерела
Анотація:
Linear cryptanalysis is a statistical analysis method. Linear cryptanalysis constructs probabilistic patterns first and then distinguishes the cipher from a random permutation using lots of plaintext-ciphertext pairs. Linear cryptanalysis has a big data complexity. Algebraic attack attempts to exploit the algebraic structure of the cipher by expressing the encryption transformation as a set of polynomial equations and then attempts to solve the system to recover the encryption key. Algebraic attacks do not need too much data. This paper combines these two methods by using algebraic techniques
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Et.al, Quazi Warisha Ahmed. "Energetic Data Security Management Scheme using Hybrid Encryption Algorithm over Cloud Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 201–8. http://dx.doi.org/10.17762/turcomat.v12i6.1289.

Повний текст джерела
Анотація:
Now-a-days all documents are in a digital format as well as everyone need to maintain their data in electronic mode with the help of cloud servers. A cloud server provides lots of facilities to users such as remote data maintenance, huge data handling and so on. But in the case of security many cloud servers are providing probabilistic results alone. So, that a new cloud server data maintenance scheme is required to provide a high-level data security to the cloud system in an efficient manner. This paper introduces a new crypto-approach called Novel Hybrid Encryption Mode (NHEM), in which this
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Ahmad, Fawad, Reshail Khan, and Armel Asongu Nkembi. "Improvement in the Interception Vulnerability Level of Encryption Mechanism in GSM." Inventions 10, no. 4 (2025): 56. https://doi.org/10.3390/inventions10040056.

Повний текст джерела
Анотація:
Data security is of the utmost importance in the domain of real-time environmental monitoring systems, particularly when employing advanced context-aware intelligent visual analytics. This paper addresses a significant deficiency in the Global System for Mobile Communications (GSM), a widely employed wireless communication system for environmental monitoring. The A5/1 encryption technique, which is extensively employed, ensures the security of user data by utilizing a 64-bit session key that is divided into three linear feedback shift registers (LFSRs). Despite the shown efficacy, the developm
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Senthil Kumar, K., and D. Malathi. "A Novel method to represent Access Tree structure by Context Free Grammar with and-or graph in Key Policy based Attribute based Encryption." International Journal of Engineering & Technology 7, no. 4.10 (2018): 396. http://dx.doi.org/10.14419/ijet.v7i4.10.20946.

Повний текст джерела
Анотація:
Important and sensitivity data of users in a third party managed internet or cloud always pose various security as well as privacy issues. Attribute-based encryption (ABE) is a pleasant trend in the literature which addresses above problem in an efficient way, and provides data security and fine-grained access control in a decentralized manner,. Key-policy attribute-based encryption (KP-ABE) is an important type of ABE, in which user can decrypt his message with a set of attributes and private keys are embedded with a access control structure which defines which cipher text an user can be allo
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Jayapandian, N., and A. M. J. Md Zubair Rahman. "Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption." Cluster Computing 20, no. 2 (2017): 1561–73. http://dx.doi.org/10.1007/s10586-017-0809-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Feilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (2024): 227–40. http://dx.doi.org/10.52783/jes.635.

Повний текст джерела
Анотація:
In an increasingly interconnected world, the convergence of power system networks and biometric-based biomedical applications presents unique challenges for data protection and privacy. This research endeavors to conceptualize and design an intelligent countermeasure system that serves as a robust defense mechanism for enhancing security in this complex ecosystem. The proposed system incorporates biometric authentication techniques to fortify user access controls, implements advanced encryption methods for safeguarding sensitive biomedical data, and intrusion detection and prevention mechanism
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Li, Jun, Chenyang Zhang, Jianyi Zhang, and Yanhua Shao. "Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning." Future Internet 16, no. 4 (2024): 113. http://dx.doi.org/10.3390/fi16040113.

Повний текст джерела
Анотація:
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obscure the true identities of blockchain transaction participants. By integrating commitment schemes and zero-knowledge proof techniques with deep learning graph neural network technology, it provides privacy protection and regulatory analysis of blockchain transaction data. This approach not only prevents the leakage of sensitive transaction info
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Trivedi, Devharsh, Aymen Boudguiga, Nesrine Kaaniche, and Nikos Triandopoulos. "SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation." Cryptography 7, no. 4 (2023): 52. http://dx.doi.org/10.3390/cryptography7040052.

Повний текст джерела
Анотація:
Security log collection and storage are essential for organizations worldwide. Log analysis can help recognize probable security breaches and is often required by law. However, many organizations commission log management to Cloud Service Providers (CSPs), where the logs are collected, processed, and stored. Existing methods for log anomaly detection rely on unencrypted (plaintext) data, which can be a security risk. Logs often contain sensitive information about an organization or its customers. A more secure approach is always to keep logs encrypted (ciphertext). This paper presents “SigML++
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Prasanna Kumar M, Et al. "A Lightweight Security Model using Delta Probabilistic Hashing Technique for Secured Data Transmission in IoT Systems." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 2097–107. http://dx.doi.org/10.17762/ijritcc.v11i10.8895.

Повний текст джерела
Анотація:
Secure data transmission is one of the most pressing concerns for resource constrained IoT devices. There is a need for an efficient and lightweight solution for data security in IoT applications. The proposed study is primarily concerned with the creation of a lightweight data security model for an IoT data transmission-based application for data transmission and storage in smart cities. The fundamental contribution of the proposed security model is the creation of a distinct hashing algorithm based on the specific pattern of the previous sequential change in value. The Delta Probabilistic Ha
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Prakash, A. John, and B. Lydia Elizabeth. "Pindex: Private multi-linked index for encrypted document retrieval." PLOS ONE 16, no. 8 (2021): e0256223. http://dx.doi.org/10.1371/journal.pone.0256223.

Повний текст джерела
Анотація:
Cryptographic cloud storage is used to make optimal use of the cloud storage infrastructure to outsource sensitive and mission-critical data. The continuous growth of encrypted data outsourced to cloud storage requires continuous updating. Attacks like file-injection are reported to compromise confidentiality of the user as a consequence of information leakage during update. It is required that dynamic schemes provide forward privacy guarantees. Updates should not leak information to the untrusted server regarding the previously issued queries. Therefore, the challenge is to design an efficien
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Dadheech, Pankaj, Abolfazl Mehbodniya, Shivam Tiwari, et al. "Zika Virus Prediction Using AI-Driven Technology and Hybrid Optimization Algorithm in Healthcare." Journal of Healthcare Engineering 2022 (January 12, 2022): 1–13. http://dx.doi.org/10.1155/2022/2793850.

Повний текст джерела
Анотація:
The Zika virus presents an extraordinary public health hazard after spreading from Brazil to the Americas. In the absence of credible forecasts of the outbreak's geographic scope and infection frequency, international public health agencies were unable to plan and allocate surveillance resources efficiently. An RNA test will be done on the subjects if they are found to be infected with Zika virus. By training the specified characteristics, the suggested Hybrid Optimization Algorithm such as multilayer perceptron with probabilistic optimization strategy gives forth a greater accuracy rate. The
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Gu, Zhen, Guoyin Zhang, and Chen Yang. "Horizontally Partitioned Data Publication with Differential Privacy." Security and Communication Networks 2022 (July 31, 2022): 1–13. http://dx.doi.org/10.1155/2022/7963004.

Повний текст джерела
Анотація:
In this paper, we study the privacy-preserving data publishing problem in a distributed environment. The data contain sensitive information; hence, directly pooling and publishing the local data will lead to privacy leaks. To solve this problem, we propose a multiparty horizontally partitioned data publishing method under differential privacy (HPDP-DP). First, in order to make the noise level of the published data in the distributed scenario the same as in the centralized scenario, we use the infinite divisibility of the Laplace distribution to design a distributed noise addition scheme to per
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Rocha, Bruno Santos, Jose Antonio Moreira Xexeo, and Renato Hidaka Torres. "Post-quantum cryptographic algorithm identification using machine learning." Journal of Information Security and Cryptography (Enigma) 9, no. 1 (2022): 1–8. http://dx.doi.org/10.17648/jisc.v9i1.81.

Повний текст джерела
Анотація:
This research presents a study on the identification of post-quantum cryptography algorithms through machine learning techniques. Plain text files were encoded by four post-quantum algorithms, participating in NIST's post-quantum cryptography standardization contest, in ECB mode. The resulting cryptograms were submitted to the NIST Statistical Test Suite to enable the creation of metadata files. These files provide information for six data mining algorithms to identify the cryptographic algorithm used for encryption. Identification performance was evaluated in samples of different sizes. The s
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Sharov, Vladyslav, and Olena Nikulina. "LAYERED DEFENSE IN COMMUNICATION SYSTEMS: JOINT USE OF VPN PROTOCOLS AND LINEAR BLOCK CODES." Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, no. 1 (13) (July 11, 2025): 112–16. https://doi.org/10.20998/2079-0023.2025.01.17.

Повний текст джерела
Анотація:
With the rapid increase in the volume of transmitted information and the proliferation of distributed network infrastructures, the requirements for the security and reliability of communication channels are steadily intensifying. Traditional protection methods, such as virtual private networks (VPNs), are primarily aimed at ensuring confidentiality and authenticity through cryptographic algorithms, while typically lacking resilience to transmission-level errors arising from noise, interference, or hardware failures. In contrast, error correction codes—such as Hamming codes—are well-established
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Pinnapati, Surekha, and Prakasha Shivanna. "An efficient data compression and storage technique with key management authentication in cloud space." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 3 (2024): 1680. http://dx.doi.org/10.11591/ijeecs.v35.i3.pp1680-1687.

Повний текст джерела
Анотація:
Cloud computing is one of the promising technologies that offers cost-effective choices for processing and storing the huge volumes of data. In today’s world, data is the most important asset that one can have but it needs to be handled and protected properly. Portability of data can be increased by reducing the size of the data to be stored because of the limited storage space. As a result, data compression has arisen significantly. Data compression is a useful technique for reducing data size and increasing the effectiveness of data transit and storage. Data compression reduces the size of a
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Surekha, Pinnapati Prakasha Shivanna. "An efficient data compression and storage technique with key management authentication in cloud space." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 3 (2024): 1680–87. https://doi.org/10.11591/ijeecs.v35.i3.pp1680-1687.

Повний текст джерела
Анотація:
Cloud computing is one of the promising technologies that offers cost-effective choices for processing and storing the huge volumes of data. In today’s world, data is the most important asset that one can have but it needs to be handled and protected properly. Portability of data can be increased by reducing the size of the data to be stored because of the limited storage space. As a result, data compression has arisen significantly. Data compression is a useful technique for reducing data size and increasing the effectiveness of data transit and storage. Data compression reduces the siz
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Solunke, Hiralal Bhaskar, Pawan Bhaladhare, and Amol Potgantwar. "Design of an iterative method for privacy : Preserving blockchain networks integrating dynamic routing with deep Q-networks and homomorphic encryption-based secure routing." Journal of Information and Optimization Sciences 46, no. 4-A (2025): 1081–90. https://doi.org/10.47974/jios-1893.

Повний текст джерела
Анотація:
The burgeoning digital landscape has necessitated advancements in blockchain network optimization, particularly in enhancing privacy without compromising network efficiency. Existing blockchain routing mechanisms often fail to address comprehensive privacy concerns, typically offering suboptimal trade-offs between privacy preservation and network performance. The proposed model encompasses five innovative methods. First, Dynamic Routing with Deep Q-Networks (DR-DQN) leverages deep Q-learning to adapt routing paths dynamically based on network conditions and privacy requirements. It significant
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Khadidos, Adil O., S. Shitharth, Alaa O. Khadidos, K. Sangeetha, and Khaled H. Alyoubi. "Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism." Journal of Sensors 2022 (June 2, 2022): 1–17. http://dx.doi.org/10.1155/2022/8457116.

Повний текст джерела
Анотація:
Providing security to the healthcare data stored in an IoT-cloud environment is one of the most challenging and demanding tasks in recent days. Because the IoT-cloud framework is constructed with an enormous number of sensors that are used to generate a massive amount of data, however, it is more susceptible to vulnerabilities and attacks, which degrades the security level of the network by performing malicious activities. Hence, Artificial Intelligence (AI) technology is the most suitable option for healthcare applications because it provides the best solution for improving the security and r
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Neamah Abbas, Farah, Mohanad Ridha Ghanim, and Rafal Naser Saleh. "Subject Review:AI-Driven Security in Quantum Machine Learning:Vulnerabilities,Threats, and Defenses." International Journal of Engineering Research and Advanced Technology 11, no. 04 (2025): 01–22. https://doi.org/10.31695/ijerat.2025.4.1.

Повний текст джерела
Анотація:
Quantum Machine Learning (QML) has advanced significantly thanks to the combination of Quantum Computing (QC) with Artificial Intelligence (AI), hence releasing computational benefits over conventional methods. This synergy does, however, also bring fresh security flaws like adversarial attacks, quantum noise manipulation, and cryptographic weaknesses. This work offers a thorough investigation of QML security along with an examination of its special vulnerabilities resulting from hardware-induced faults, quantum variational circuits, and quantum data encoding. We methodically investigate adver
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Su, Man Nam1 and Tae Ho Cho2. "A SECURITY METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: AGAINST FALSE-REPORT INJECTION, FALSE-VOTE INJECTION, AND WORMHOLE ATTACKS." A SECURITY METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: AGAINST FALSE-REPORT INJECTION, FALSE-VOTE INJECTION, AND WORMHOLE ATTACKS 02, dec (2014): 01–17. https://doi.org/10.5121/ieij.2014.2402.

Повний текст джерела
Анотація:
In a large-scale wireless sensor network, damage spreads rapidly in the network when under false report injection, false votes injection, or wormhole attacks. These attacks cause finite energy resources to be drained, legitimate reports to be dropped, and data to be intercepted by adversary nodes. A probabilistic voting-based filtering scheme (PVFS) and localized encryption and authentication protocol (LEAP) can be used to cope with these attacks. When multiple attacks occur simultaneously, PVFS and LEAP should be operated together. But the concurrent application of PVFS and LEAP provides inef
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Dhivya. R, B. Srinivasan. "Probabilistic Deming Deep Recursive Network and Schmidt-Samoa Cryptosystem for Cyber Attack Detection and Secure Transmission in Wireless Networks." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 1427–50. https://doi.org/10.52783/cana.v32.4167.

Повний текст джерела
Анотація:
A wireless network is an elastic data communications system that exploits wireless media to broadcast data over the network. In wireless network, cyber attack detection is vital for maintaining the security and integrity of communication systems since these networks are more susceptible to different threats due to their open, dynamic, and broadcast nature. Therefore, cyber-attacks are becoming more difficult, targeting systems that handle or store sensitive information. Due to the rapid increase in cyber-attacks, the design of a detection mechanism discovers the harmful effect and attacks. The
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Maheshbhai, Kansara. "Advancements in Cloud Database Migration: Current Innovations and Future Prospects for Scalable and Secure Transitions." Sage Science Review of Applied Machine Learning 7, no. 1 (2024): 127–43. https://doi.org/10.5281/zenodo.15033980.

Повний текст джерела
Анотація:
<strong>Abstract</strong> Cloud database migration is a seminal transformation in modern data management, constituting the foundation of the evolution from legacy and on-premises environments to scalable and distributed cloud environments. This research paper presents a detailed study of the existing technical challenges and emerging methodologies in cloud database migration with special emphasis on automation, data integrity, and optimization of performance. The study covers advanced migration paradigms that employ state-of-the-art virtualization, container orchestration, and machine learning
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Yu, Yun William, and Griffin M. Weber. "Balancing Accuracy and Privacy in Federated Queries of Clinical Data Repositories: Algorithm Development and Validation." Journal of Medical Internet Research 22, no. 11 (2020): e18735. http://dx.doi.org/10.2196/18735.

Повний текст джерела
Анотація:
Background Over the past decade, the emergence of several large federated clinical data networks has enabled researchers to access data on millions of patients at dozens of health care organizations. Typically, queries are broadcast to each of the sites in the network, which then return aggregate counts of the number of matching patients. However, because patients can receive care from multiple sites in the network, simply adding the numbers frequently double counts patients. Various methods such as the use of trusted third parties or secure multiparty computation have been proposed to link pa
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Sayeed, Aqsa, Chaman Verma, Neerendra Kumar, Neha Koul, and Zoltán Illés. "Approaches and Challenges in Internet of Robotic Things." Future Internet 14, no. 9 (2022): 265. http://dx.doi.org/10.3390/fi14090265.

Повний текст джерела
Анотація:
The Internet of robotic things (IoRT) is the combination of different technologies including cloud computing, robots, Internet of things (IoT), artificial intelligence (AI), and machine learning (ML). IoRT plays a major role in manufacturing, healthcare, security, and transport. IoRT can speed up human development by a very significant percentage. IoRT allows robots to transmit and receive data to and from other devices and users. In this paper, IoRT is reviewed in terms of the related techniques, architectures, and abilities. Consequently, the related research challenges are presented. IoRT a
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Kjamilji, Artrim. "Techniques and Challenges while Applying Machine Learning Algorithms in Privacy Preserving Fashion." Proceeding International Conference on Science and Engineering 3 (April 30, 2020): xix. http://dx.doi.org/10.14421/icse.v3.600.

Повний текст джерела
Анотація:
Nowadays many different entities collect data of the same nature, but in slightly different environments. In this sense different hospitals collect data about their patients’ symptoms and corresponding disease diagnoses, different banks collect transactions of their customers’ bank accounts, multiple cyber-security companies collect data about log files and corresponding attacks, etc. It is shown that if those different entities would merge their privately collected data in a single dataset and use it to train a machine learning (ML) model, they often end up with a trained model that outperfor
Стилі APA, Harvard, Vancouver, ISO та ін.
40

"Identity Based Data Sharing and Profile Matching using Probabilistic Key in Cloud." International Journal of Recent Technology and Engineering 8, no. 6 (2020): 3076–80. http://dx.doi.org/10.35940/ijrte.f8434.038620.

Повний текст джерела
Анотація:
Cloud technology is popular since the utilizations and their information are expanding hugely step by step. It gives usefulness to overseeing data information in a conveyed and pervasive way supporting many platform. Data sharing and security problem are the principle issue to the increasing use of health care, since health information is delicate. However issues, for example, risks of privacy exposure ,versatility in key administration, adaptable access and effective uses denial always been the most significant difficulties for accomplishing goodgrained cryptographically upheld information ac
Стилі APA, Harvard, Vancouver, ISO та ін.
41

"A Symmetric Searchable Encryption Identification of Data on Probabilistic Trapdoors." International Journal of Engineering and Advanced Technology 9, no. 3 (2020): 3880–83. http://dx.doi.org/10.35940/ijeat.c6389.029320.

Повний текст джерела
Анотація:
Accessible Encryption (SE) permits a client in accordance with transfer records in accordance with the astronaut and according to seem thru it of a faraway manner while defending the security concerning each the statistics yet the inquiries. Right now, entrust a generative then the simple in imitation of actualize Symmetric Searchable Encryption Scheme because instance (SSE) [4]. This tale takes the some round concerning correspondence namely O(n) instances on calculations upstairs n range regarding records . We likewise presented some other variety of Search Pattern Privacy, as gives a percen
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Nagnath, Ingale Ashwini. "A Modified Approach on Security Analysis Using Probabilistic Order Preserving Encryption Based on Cloud Data Serach." International Journal Of Engineering And Computer Science, January 30, 2017. http://dx.doi.org/10.18535/ijecs/v6i1.58.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Naga Srinivasu, Parvathaneni, Ranjit Panigrahi, Ashish Singh, and Akash Kumar Bhoi. "Probabilistic Buckshot Driven Cluster Head Identification and Accumulative Data Encryption in WSN." Journal of Circuits, Systems and Computers, June 17, 2022. http://dx.doi.org/10.1142/s0218126622503030.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

"Enhanced Security of Encrypted Text by KDMT: Key-Domain Maximization Technique." International Journal of Recent Technology and Engineering 8, no. 5 (2020): 1385–88. http://dx.doi.org/10.35940/ijrte.e6326.018520.

Повний текст джерела
Анотація:
Encryption-decryption techniques have been the backbone of network security in the modern era of wireless transmission of data. We present here a more secured encryption-decryption method based on the maximization of key domain in finite field. The proposed technique uses a random primary key to fetch the encryption-decryption key-pair furnished by a unique decomposition. A secondary key taken from a subdomain with specific property is used to add more randomness in the encrypted text structure. A probabilistic comparison of key prediction by hacker is also discussed to justify the added secur
Стилі APA, Harvard, Vancouver, ISO та ін.
45

M. Swetha and G. Appa Rao. "Hybrid Ensemble Lightweight Cryptosystem for Internet of Medical Things Security." International Journal of Computational and Experimental Science and Engineering 10, no. 4 (2024). https://doi.org/10.22399/ijcesen.625.

Повний текст джерела
Анотація:
Internet of Medical Things (IoMT) is a fast-developing area that includes the use of connected medical devices to enhance patient care and expedite the procedures involved in the delivery of healthcare. Concerns about the safety and confidentiality of patient information are a roadblock to the broad use of telemedicine technologies like IoMT. Encryption is an essential part of IoMT security, and there is a wide variety of encryption methods that are used to safeguard sensitive patient data. This work implemented a hybrid ensemble lightweight cryptosystem (HELC) using probabilistic rivest ciphe
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Andreou, Andreas, Constandinos X. Mavromoustakis, George Mastorakis, et al. "Towards an optimized security approach to IoT devices with confidential healthcare data exchange." Multimedia Tools and Applications 80 (March 26, 2021). https://doi.org/10.1007/s11042-021-10827-x.

Повний текст джерела
Анотація:
Reliable data exchange and efficient image transfer are currently significant research challenges in health care systems. To incentivize data exchange within the Internet of Things (IoT) framework, we need to ensure data sovereignty by facilitating secure data exchange between trusted parties. The security and reliability of data-sharing infrastructure require a community of trust. Therefore, this paper introduces an encryption frame based on data fragmentation. It also presents a novel, deterministic grey-scale optical encryption scheme based on fundamental mathematics. The objective is to us
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Jalasri, M., and L. Lakshmanan. "Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm." Cluster Computing, May 17, 2022. http://dx.doi.org/10.1007/s10586-022-03606-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Thurairasu, Lisa, and Nelson Chong. "Information Management at a Health Services Research Organization in Toronto, Ontario, Canada: Moving from Identifiable Data to Coded Data." International Journal of Population Data Science 1, no. 1 (2017). http://dx.doi.org/10.23889/ijpds.v1i1.307.

Повний текст джерела
Анотація:
ABSTRACTObjectivesA health services research organization in Toronto, Ontario, Canada conducts population-based research to improve the health of Canadians in seven main areas: (1) cancer, (2) cardiovascular disease, (3) chronic disease and pharmacology, (4) health system planning and evaluation, (5) kidney, dialysis and transplantation, (6) mental health and addictions, and (7) primary care and population health. The Information Management (IM) team within the Data Quality and Information Management (DQIM) department at our non-profit organization is an integral component for upholding privac
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Moses, Oseghale Ikeakhe. "QUANTUM AI FOR NEXT-GENERATION SECURITY IN FINTECH, CYBERSECURITY, AND HEALTHCARE." International Journal of Engineering Technology Research & Management (ijetrm) 07, no. 08 (2023). https://doi.org/10.5281/zenodo.14837113.

Повний текст джерела
Анотація:
Quantum Artificial Intelligence (Quantum AI) is poised to revolutionize FinTech, Cybersecurity, and Healthcare byenhancing data encryption, security resilience, and computational efficiency. Quantum algorithms such as Shor&rsquo;sAlgorithm and Grover&rsquo;s Algorithm provide an exponential speed-up in solving cryptographic and security challenges.This research explores the integration of Quantum AI in fraud detection, quantum-secure encryption protocols, andmedical AI decision-making. Our proposed Quantum AI security model demonstrates a 98% reduction in cybervulnerabilities while improving A
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Anwarbasha, H., S. Sasi Kumar, and D. Dhanasekaran. "An efficient and secure protocol for checking remote data integrity in multi-cloud environment." Scientific Reports 11, no. 1 (2021). http://dx.doi.org/10.1038/s41598-021-93073-3.

Повний текст джерела
Анотація:
AbstractIn cloud environment, huge quantity of data has been generated at each and every second. In order to manage the data, cloud service provider makes use of multi-cloud platform to fulfill the requirement. The service provider cooperatively operates altogether for the accessibility of resources and are improvised by implementing the dynamic operation that can run at a time through the Multi-cloud environment. This paper presents a Dynamic Level Based Integrity Checking Protocol (DA-ICP) for storing data in multicloud environment. The proposed method introduces Provable Data Possession (PD
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!