过去一年中添加的文章,按日期排序

[HTML][HTML] DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets

S Aqeel, SU Khan, AS Khan, M Alharbi, S Shah… - Scientific Reports, 2024 - nature.com
5 天前 - … trends of using cryptographic methods for network security then … other studies
reviewed the general cryptographic methods without using the systematic approach. (ii) Our study

GENIE: Watermarking Graph Neural Networks for Link Prediction

V Sai Pranav Bachina, A Gangwal… - arXiv e …, 2024 - ui.adsabs.harvard.edu
9 天前 - … Recent studies have shown GNNs to be vulnerable to model-stealing attacks, which
… over IP rights protection. Watermarking has been shown to be effective at protecting the IP …

Enhanced Data Security and Storage Efficiency in Cloud Computing: A Survey of Data Compression and Encryption techniques

A Abdo, T Salem Karamany… - FCI-H Informatics …, 2024 - fcihib.journals.ekb.eg
9 天前 - Securing data at rest and in transit is one of the most pressing issues faced by
cloud … a comparative study between data encryption and compression algorithms, especially …

[PDF][PDF] Hybrid encryption based on a generative adversarial network

I Amir, H Suhaimi, R Mohamad… - … and Computer …, 2024 - researchgate.net
11 天前 - research explores hybrid encryption based on a generative adversarial network (GAN)
for improved message encryption… the field of secure communication and data protection. …

[HTML][HTML] Data security in the Industrial Internet of Things (IIoT) through a triple-image encryption framework leveraging 3-D NEAT, 1DCJ, and 4DHCFO techniques

A Mehmood, A Shafique, N Kumar… - Computers and Electrical …, 2024 - Elsevier
13 天前 - … In the Industrial Internet of Things (IIoT) era, protecting vast data volumes, including
sensitive … To address this issue, this research proposes a novel triple-image encryption

[图书][B] Fog Computing for Intelligent Cloud IoT Systems

C Banerjee, A Ghosh, R Chakraborty, AA Elngar - 2024 - books.google.com
14 天前 - … privacy compliance that assures protecting the vital data in … used for this research
and the basics and advantages of … basics of public key cryptography, this chapter discusses …

Research on key privacy protection technologies supporting flexible distributed resource layered aggregation transactions

S Sun, X Zhu, W Wang, X Zhang… - … on Computer Network …, 2024 - spiedigitallibrary.org
14 天前 - … 4.2 Selection of privacy protectionresearch, this article applies blockchain
technology combined with privacy protection technologies such as asymmetric encryption and …

Research on a more safe image encryption communication algorithm

L Liu, Y Li, T Wang, Y Qin… - … on Computer Network …, 2024 - spiedigitallibrary.org
14 天前 - encryptionencryption has been one of the hotspots of research. Over the past
decades, researchers have proposed a variety of image encryption methods aimed at protecting

Research on privacy data processing based on symmetric encryption algorithm

H Guo - International Conference on Computer Network …, 2024 - spiedigitallibrary.org
14 天前 - … to protect the pri-vacy data, data owners may encrypt the … Cloud server can not
guarantee the encryption data are … a novel symmetric encryption algorithm to encrypt the privacy …

A Super Encryption Approach for Enhancing Digital Security using Column Transposition-Hill Cipher for 3D Image Protection

LB Handoko, C Umam - … , Information System, Computer Network …, 2024 - kinetik.umm.ac.id
15 天前 - … Image encryption is an indispensable technique in the realm of information security,
study scrutinizes the effectiveness of merging columnar transposition with the Hill Cipher