Articles with "decryption" as a keyword



Photo by jontyson from unsplash

Sophisticated yet Convenient Information Encryption/Decryption Based on Synergistically Time‐/Temperature‐Resolved Photonic Inks

Sign Up to like & get
recommendations!
Published in 2022 at "Advanced Science"

DOI: 10.1002/advs.202206290

Abstract: Exploring high‐safety but convenient encryption and decryption technologies to combat threats of information leakage is urgently needed but remains a great challenge. Here, a synergistically time‐ and temperature‐resolved information coding/decoding solution based on functional photonic… read more here.

Keywords: information; time; decryption; encryption ... See more keywords
Photo from archive.org

A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Personal Communications"

DOI: 10.1007/s11277-020-07503-y

Abstract: Attribute based encryption is an effective method which can solve the access control problem of cloud storage. Realizing both efficient attributes revocation and outsourcing decryption would enhance mobile user experience. In this paper, we present… read more here.

Keywords: system; decryption; flexible abe; mobile user ... See more keywords
Photo from wikipedia

Research on Self-Adaptive Group Key Management in Deep Space Networks

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Personal Communications"

DOI: 10.1007/s11277-020-07540-7

Abstract: Deep space network is a must-have technology to improve communication, navigation, and propulsion in future space missions, a very long physical distance among space entities is difficult to overcome efficiently as a space mission could… read more here.

Keywords: space; reliable end; decryption; end end ... See more keywords
Photo from wikipedia

Volume holographic optical encryption and decryption in photorefractive LiNbO3:Fe crystal

Sign Up to like & get
recommendations!
Published in 2019 at "Optics Communications"

DOI: 10.1016/j.optcom.2018.12.049

Abstract: Abstract We present general volume holographic encryption and decryption system by means of two wave mixing process that can apply to variety of diffraction domains, including the conventional Fourier hologram domain (using 4f-optical processor), the… read more here.

Keywords: encryption decryption; volume holographic; decryption; photorefractive linbo3 ... See more keywords
Photo by strong18philip from unsplash

Swelling-Induced Information Camouflage and Optical Decryption on a Transparent Recoverable Hydrogel Surface.

Sign Up to like & get
recommendations!
Published in 2022 at "ACS applied materials & interfaces"

DOI: 10.1021/acsami.1c22745

Abstract: Information camouflage and decryption on hydrogels rely on chemical stimuli such as pH, ultraviolet light, and chemical reactions, in which the cyclability is limited. This work develops a simpler yet effective physical method that can… read more here.

Keywords: information; decryption; camouflage; information camouflage ... See more keywords
Photo by aleexcif from unsplash

Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2902040

Abstract: Since cloud computing has been playing an increasingly important role in real life, the privacy protection in many fields has been paid more and more attention, especially, in the field of personal health record (PHR).… read more here.

Keywords: access; decryption; policy; personal health ... See more keywords
Photo by mullyadii from unsplash

Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2907364

Abstract: The notion of attribute-based encryption with outsourced decryption (OD-ABE) was proposed by Green, Hohenberger, and Waters. In OD-ABE, the ABE ciphertext is converted to a partially-decrypted ciphertext that has a shorter bit length and a… read more here.

Keywords: decryption; attribute based; generic approach; security ... See more keywords
Photo from wikipedia

Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Journal on Selected Areas in Communications"

DOI: 10.1109/jsac.2020.3020656

Abstract: The rapid development of the Internet of Things (IoT) has led to the emergence of more and more novel applications in recent years. One of them is the e-health system, which can provide people with… read more here.

Keywords: system; health; decryption; personal health ... See more keywords
Photo from wikipedia

Application of Chaotic Encryption and Decryption in Wireless Transmission From Sensory Toolholders on Machine Tools

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Sensors Journal"

DOI: 10.1109/jsen.2023.3265777

Abstract: In recent years, several industries have increased their demand for processing precision, automatic detection, and visualization interfaces. Therefore, to keep pace with the fourth industrial revolution, machine tool operators install a large number of sensors… read more here.

Keywords: system; wireless; decryption; machine ... See more keywords
Photo by bernardhermant from unsplash

Efficient Decentralized Attribute Based Access Control for Mobile Clouds

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2017.2754255

Abstract: Fine grained access control is a requirement for data stored in untrusted servers like clouds. Owing to the large volume of data, decentralized key management schemes are preferred over centralized ones. Often encryption and decryption… read more here.

Keywords: access; decryption; attribute based; decentralized attribute ... See more keywords
Photo from wikipedia

High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G communications

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Electrical and Computer Engineering"

DOI: 10.11591/ijece.v11i5.pp4221-4232

Abstract: In this research work, a fast and lightweight AES-128 cypher based on the Xilinx ZCU102 FPGA board is presented, suitable for 5G communications. In particular, both encryption and decryption algorithms have been developed using a… read more here.

Keywords: encryption decryption; aes 128; decryption; performance aes ... See more keywords