Articles with "cryptographic techniques" as a keyword



A Comprehensive Review of Cryptographic Techniques in Federated Learning for Secure Data Sharing and Applications

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Access"

DOI: 10.1109/access.2025.3593953

Abstract: The demand for secure data sharing is growing fast in sensitive domains like healthcare, finance, and IoT. Federated Learning (FL) introduces a decentralised machine learning paradigm whereby models can be trained over distributed nodes without… read more here.

Keywords: cryptographic techniques; secure data; data sharing; privacy ... See more keywords

DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Electrical and Computer Engineering"

DOI: 10.11591/ijece.v7i2.pp1032-1041

Abstract: Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance… read more here.

Keywords: algorithm; integration; cryptographic techniques; security ... See more keywords