Articles with "scheme based" as a keyword



Photo from archive.org

Defended data transmission scheme based reliable metering for smart grid applications

Sign Up to like & get
recommendations!
Published in 2018 at "Cluster Computing"

DOI: 10.1007/s10586-018-2286-9

Abstract: To expand the usage, reliability, availability of power resources and some distribution system must be met which is conceivable by the support of present day information technologies. This paper concentrates on client support and electricity… read more here.

Keywords: based reliable; transmission scheme; reliable metering; data transmission ... See more keywords

Traceable Quantum Steganography Scheme Based on Pixel Value Differencing

Sign Up to like & get
recommendations!
Published in 2019 at "Scientific Reports"

DOI: 10.1038/s41598-019-51598-8

Abstract: A novel and traceable quantum steganography scheme based on pixel value differencing (PVD) is proposed. In the proposed scheme, a quantum cover image is divided into non-overlapping blocks of two consecutive pixels. Then, by a… read more here.

Keywords: image; traceable quantum; value; scheme ... See more keywords

An adaptive robust watermarking scheme based on chaotic mapping

Sign Up to like & get
recommendations!
Published in 2024 at "Scientific Reports"

DOI: 10.1038/s41598-024-76101-w

Abstract: Digital images have become an important way of transmitting information, and the risk of attacks during transmission is increasing. Image watermarking is an important technical means of protecting image information security and plays an important… read more here.

Keywords: scheme; chaotic mapping; image; watermarking scheme ... See more keywords

Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve

Sign Up to like & get
recommendations!
Published in 2019 at "Electronics Letters"

DOI: 10.1049/el.2019.0032

Abstract: Blind signcryption schemes are the extension of signcryption schemes. They are used to protect the privacy and identity of the sender from other users, especially in electronic voting and electronic cash payment systems. A number… read more here.

Keywords: signcryption scheme; blind signcryption; based elliptic; signcryption ... See more keywords

A VANET privacy protection scheme based on fair blind signature and secret sharing algorithm

Sign Up to like & get
recommendations!
Published in 2017 at "Automatika"

DOI: 10.1080/00051144.2018.1426294

Abstract: ABSTRACT Vehicular ad hoc network (VANET) is a traffic application of wireless sensor network, which is also a new mobile ad hoc networks composed of vehicle nodes, roadside units, service providers and other components. In… read more here.

Keywords: vanet; based fair; fair blind; scheme based ... See more keywords

A verifiable multi-secret sharing scheme based on LCD quadratic residue codes

Sign Up to like & get
recommendations!
Published in 2025 at "International Journal of Computer Mathematics"

DOI: 10.1080/00207160.2025.2493959

Abstract: In this paper, we propose a verifiable multi-secret sharing scheme based on quadratic residue (QR) codes that are linear complementary dual (LCD). By this method, the shareholders can verify each other by putting their shares… read more here.

Keywords: multi secret; verifiable multi; secret sharing; quadratic residue ... See more keywords

New-type optical visual cryptography scheme based on computational holographic encoding

Sign Up to like & get
recommendations!
Published in 2025 at "Laser Physics"

DOI: 10.1088/1555-6611/add002

Abstract: Visual cryptography (VC) schemes rely on the human visual system to protect image content. Due to their security, simplicity and ease of use, they have been widely applied in various information security scenarios. However, they… read more here.

Keywords: scheme; visual cryptography; type optical; new type ... See more keywords

AP Selection Scheme Based on Achievable Throughputs in SDN-Enabled WLANs

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2018.2888638

Abstract: To ensure an efficient coverage and allow transparent mobility, it is common to find a number of access points (APs) deployed in the neighborhood of each other in current WLANs. A mobile terminal (MT) often… read more here.

Keywords: achievable throughputs; based achievable; scheme based; selection ... See more keywords

A Novel Image Encryption Scheme Based on Nonuniform Sampling in Block Compressive Sensing

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2897721

Abstract: This paper devotes to the image compression and encryption problems. We develop a novel hybrid scheme based on block compressive sensing. Concentrate on taking full advantage of the different frequency coefficients sparsity, the nonuniform sampling… read more here.

Keywords: nonuniform sampling; scheme; compressive sensing; image ... See more keywords

A Multi-Antenna Spectrum Sensing Scheme Based on Main Information Extraction and Genetic Algorithm Clustering

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2936511

Abstract: Spectrum sensing is an indispensable technology for cognitive radio networks, which enables secondary users (SUs) to discover spectrum holes and to opportunistically use under-utilized channels without causing interference to primary users. Aim at improving the… read more here.

Keywords: main information; scheme based; information; spectrum sensing ... See more keywords

Improved Adaptive Protection Scheme Based Combined Centralized/Decentralized Communications for Power Systems Equipped With Distributed Generation

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3205312

Abstract: Recently, numerical relays with communication capabilities have been employed to provide adaptive solutions for Distributed Generations (DGs) protection issues. This paper presents an adaptive protection scheme based on centralized and decentralized communication to address DG… read more here.

Keywords: protection; communication; protection scheme; scheme based ... See more keywords