To see the other types of publications on this topic, follow the link: Probabilistic data encryption.

Journal articles on the topic 'Probabilistic data encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Probabilistic data encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

N., V. V. Satyanarayana, M. S. V. Ravi Kumar J., Babu Reddy M., Leelavathi N., and Sujatha B. "A Symmetric Searchable Encryption Identification of Data on Probabilistic Trapdoors." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 3880–83. https://doi.org/10.35940/ijeat.C6389.029320.

Full text
Abstract:
Accessible Encryption (SE) permits a client in accordance with transfer records in accordance with the astronaut and according to seem thru it of a faraway manner while defending the security concerning each the statistics yet the inquiries. Right now, entrust a generative then the simple in imitation of actualize Symmetric Searchable Encryption Scheme because instance (SSE) [4]. This tale takes the some round concerning correspondence namely O(n) instances on calculations upstairs n range regarding records . We likewise presented some other variety of Search Pattern Privacy, as gives a percen
APA, Harvard, Vancouver, ISO, and other styles
2

Mazumder, Rashed, Atsuko Miyaji, and Chunhua Su. "Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data." International Journal of Foundations of Computer Science 28, no. 06 (2017): 661–82. http://dx.doi.org/10.1142/s0129054117400123.

Full text
Abstract:
Security, privacy and data integrity are the critical issues in Big Data application of IoT-enable environment and cloud-based services. There are many upcoming challenges to establish secure computations for Big Data applications. Authenticated encryption (AE) plays one of the core roles for Big Data’s confidentiality, integrity, and real-time security. However, many proposals exist in the research area of authenticated encryption. Generally, there are two concepts of nonce respect and nonce reuse under the security notion of the AE. However, recent studies show that nonce reuse needs to sacr
APA, Harvard, Vancouver, ISO, and other styles
3

Korchynskyi, Volodymyr, Valerii Hordiichuk, Vitalii Kildishev, Oleksandr Riabukha, Sergii Staikutsa, and Khaled Alfaiomi. "Method of information protection based on the integration of probabilistic encryption and noise immune coding." Radioelectronic and Computer Systems, no. 4 (December 6, 2023): 184–95. http://dx.doi.org/10.32620/reks.2023.4.13.

Full text
Abstract:
The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data. The goal is to develop a multi-stage method for protecting information from unauthorized access, based on probabilistic encryption integration, error-correcting code, and error decorrelation. The tasks to be solved are as follows: to develop a probabilistic encryption algorithm that considers the entropy of the characters’ appearance in a message; to implement iterative coding with variable paramete
APA, Harvard, Vancouver, ISO, and other styles
4

Aruna, M. G., and K. G. Mohan. "Secured cloud data migration technique by competent probabilistic public key encryption." China Communications 17, no. 5 (2020): 168–90. http://dx.doi.org/10.23919/jcc.2020.05.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid probabilistic triple encryption approach for data security in cloud computing." International Journal of Advanced Intelligence Paradigms 21, no. 1/2 (2022): 158. http://dx.doi.org/10.1504/ijaip.2022.121035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Leung, K. C., S. L. Li, L. M. Cheng, and C. K. Chan. "A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion." Neural Processing Letters 24, no. 2 (2006): 93–105. http://dx.doi.org/10.1007/s11063-006-9006-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhu, Li Juan. "A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA." Applied Mechanics and Materials 241-244 (December 2012): 2471–74. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2471.

Full text
Abstract:
Security transaction problem between the client and the server was solved by a network identity authentication protocol of this paper. We designed this protocol from two aspects, one is the hardware structure design, and the other is data encryption. We used fingerprint sensor to gather the user’s fingerprint and characteristic value instead of password input from keyboard, and used RSA probabilistic encryption to generate public key and private key of the client and public key and private key of the server, and then used the protocol certification process to finish operation of the data encry
APA, Harvard, Vancouver, ISO, and other styles
8

Bystrevskii, Sergey A., Aleksei E. Borshevnikov, and Yuri V. Dobrzhinsky. "Data verification protocol for a confidential computing scheme with homomorphic encryption." Proceedings of Tomsk State University of Control Systems and Radioelectronics 27, no. 2 (2024): 31–36. http://dx.doi.org/10.21293/1818-0442-2024-27-2-31-36.

Full text
Abstract:
Auction trading systems and Big Data technologies play an important role in modern society. However, as soon as these technologies deal with the finances of their users, there is a need to implement security systems in them to ensure the possibility of data verification. The article proposes a data verification protocol based on the use of homomorphic encryption. A formal safety assessment of the developed protocol is shown, and an analysis from a probabilistic standpoint is carried out.
APA, Harvard, Vancouver, ISO, and other styles
9

Kulshrestha, Vartika, Seema Verma, and C. Rama Krishna. "Hybrid Probabilistic Triple Encryption (HPRRA) Approach for Data Security in Cloud Computing." International Journal of Advanced Intelligence Paradigms 1, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijaip.2021.10036005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

De, Mello Flavio, and José A. M. Xexéo. "Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence." JUCS - Journal of Universal Computer Science 24, no. (1) (2018): 25–42. https://doi.org/10.3217/jucs-024-01-0025.

Full text
Abstract:
This paper analyzes the use of machine learning techniques for the identification of encryption algorithms, from ciphertexts only. The experiment involved corpora of plain texts in seven different languages; seven encryption algorithms, each one in ECB and CBC modes; and six data mining algorithms for classification. The plain text files were encrypted with each cryptographic algorithm under both cipher modes. After that, the ciphertexts were processed to produce metadata, which were then used by the classification algorithms. The overall experiment involved not only a high quantity of ciphert
APA, Harvard, Vancouver, ISO, and other styles
11

Zhang, Jing-Wen, Xiu-Bo Chen, Gang Xu, and Yi-Xian Yang. "Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*." Chinese Physics B 30, no. 7 (2021): 070309. http://dx.doi.org/10.1088/1674-1056/ac003b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Luna, Jose Marcio, Chaouki T. Abdallah, and Gregory L. Heileman. "Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud." IEEE Transactions on Cloud Computing 6, no. 2 (2018): 428–39. http://dx.doi.org/10.1109/tcc.2016.2543728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ranadheer Reddy, Vallem. "SECURE DATA TRANSFER AND DETECTION FROM COUNTING BLOOM FILTER IN CLOUD COMPUTING." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem03096.

Full text
Abstract:
ABSTRACT: As cloud computing continues to play a pivotal role in data storage and processing, ensuring the security and integrity of transferred data remains a critical concern. This project introduces a novel approach for secure data transfer and detection leveraging the Counting Bloom Filter in cloud computing environments. The proposed system addresses the vulnerabilities associated with traditional data transfer methods by incorporating the Counting Bloom Filter, a probabilistic data structure. This technology aids in optimizing storage efficiency and enhances the accuracy of data detectio
APA, Harvard, Vancouver, ISO, and other styles
14

Gandhi, Mehak, and Kiranbir Kaur. "Enhancing Secure and Efficient Online Data Storage over Cloud Using Homomorphic with Probabilistic Encryption." International Journal of Computer Sciences and Engineering 6, no. 3 (2018): 263–68. http://dx.doi.org/10.26438/ijcse/v6i3.263268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Wei, Hong Ru, and Ya Fei Zheng. "Algebraic Techniques in Linear Cryptanalysis." Advanced Materials Research 756-759 (September 2013): 3634–39. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3634.

Full text
Abstract:
Linear cryptanalysis is a statistical analysis method. Linear cryptanalysis constructs probabilistic patterns first and then distinguishes the cipher from a random permutation using lots of plaintext-ciphertext pairs. Linear cryptanalysis has a big data complexity. Algebraic attack attempts to exploit the algebraic structure of the cipher by expressing the encryption transformation as a set of polynomial equations and then attempts to solve the system to recover the encryption key. Algebraic attacks do not need too much data. This paper combines these two methods by using algebraic techniques
APA, Harvard, Vancouver, ISO, and other styles
16

Et.al, Quazi Warisha Ahmed. "Energetic Data Security Management Scheme using Hybrid Encryption Algorithm over Cloud Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 201–8. http://dx.doi.org/10.17762/turcomat.v12i6.1289.

Full text
Abstract:
Now-a-days all documents are in a digital format as well as everyone need to maintain their data in electronic mode with the help of cloud servers. A cloud server provides lots of facilities to users such as remote data maintenance, huge data handling and so on. But in the case of security many cloud servers are providing probabilistic results alone. So, that a new cloud server data maintenance scheme is required to provide a high-level data security to the cloud system in an efficient manner. This paper introduces a new crypto-approach called Novel Hybrid Encryption Mode (NHEM), in which this
APA, Harvard, Vancouver, ISO, and other styles
17

Ahmad, Fawad, Reshail Khan, and Armel Asongu Nkembi. "Improvement in the Interception Vulnerability Level of Encryption Mechanism in GSM." Inventions 10, no. 4 (2025): 56. https://doi.org/10.3390/inventions10040056.

Full text
Abstract:
Data security is of the utmost importance in the domain of real-time environmental monitoring systems, particularly when employing advanced context-aware intelligent visual analytics. This paper addresses a significant deficiency in the Global System for Mobile Communications (GSM), a widely employed wireless communication system for environmental monitoring. The A5/1 encryption technique, which is extensively employed, ensures the security of user data by utilizing a 64-bit session key that is divided into three linear feedback shift registers (LFSRs). Despite the shown efficacy, the developm
APA, Harvard, Vancouver, ISO, and other styles
18

Senthil Kumar, K., and D. Malathi. "A Novel method to represent Access Tree structure by Context Free Grammar with and-or graph in Key Policy based Attribute based Encryption." International Journal of Engineering & Technology 7, no. 4.10 (2018): 396. http://dx.doi.org/10.14419/ijet.v7i4.10.20946.

Full text
Abstract:
Important and sensitivity data of users in a third party managed internet or cloud always pose various security as well as privacy issues. Attribute-based encryption (ABE) is a pleasant trend in the literature which addresses above problem in an efficient way, and provides data security and fine-grained access control in a decentralized manner,. Key-policy attribute-based encryption (KP-ABE) is an important type of ABE, in which user can decrypt his message with a set of attributes and private keys are embedded with a access control structure which defines which cipher text an user can be allo
APA, Harvard, Vancouver, ISO, and other styles
19

Jayapandian, N., and A. M. J. Md Zubair Rahman. "Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption." Cluster Computing 20, no. 2 (2017): 1561–73. http://dx.doi.org/10.1007/s10586-017-0809-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Feilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (2024): 227–40. http://dx.doi.org/10.52783/jes.635.

Full text
Abstract:
In an increasingly interconnected world, the convergence of power system networks and biometric-based biomedical applications presents unique challenges for data protection and privacy. This research endeavors to conceptualize and design an intelligent countermeasure system that serves as a robust defense mechanism for enhancing security in this complex ecosystem. The proposed system incorporates biometric authentication techniques to fortify user access controls, implements advanced encryption methods for safeguarding sensitive biomedical data, and intrusion detection and prevention mechanism
APA, Harvard, Vancouver, ISO, and other styles
21

Li, Jun, Chenyang Zhang, Jianyi Zhang, and Yanhua Shao. "Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning." Future Internet 16, no. 4 (2024): 113. http://dx.doi.org/10.3390/fi16040113.

Full text
Abstract:
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obscure the true identities of blockchain transaction participants. By integrating commitment schemes and zero-knowledge proof techniques with deep learning graph neural network technology, it provides privacy protection and regulatory analysis of blockchain transaction data. This approach not only prevents the leakage of sensitive transaction info
APA, Harvard, Vancouver, ISO, and other styles
22

Trivedi, Devharsh, Aymen Boudguiga, Nesrine Kaaniche, and Nikos Triandopoulos. "SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation." Cryptography 7, no. 4 (2023): 52. http://dx.doi.org/10.3390/cryptography7040052.

Full text
Abstract:
Security log collection and storage are essential for organizations worldwide. Log analysis can help recognize probable security breaches and is often required by law. However, many organizations commission log management to Cloud Service Providers (CSPs), where the logs are collected, processed, and stored. Existing methods for log anomaly detection rely on unencrypted (plaintext) data, which can be a security risk. Logs often contain sensitive information about an organization or its customers. A more secure approach is always to keep logs encrypted (ciphertext). This paper presents “SigML++
APA, Harvard, Vancouver, ISO, and other styles
23

Prasanna Kumar M, Et al. "A Lightweight Security Model using Delta Probabilistic Hashing Technique for Secured Data Transmission in IoT Systems." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 2097–107. http://dx.doi.org/10.17762/ijritcc.v11i10.8895.

Full text
Abstract:
Secure data transmission is one of the most pressing concerns for resource constrained IoT devices. There is a need for an efficient and lightweight solution for data security in IoT applications. The proposed study is primarily concerned with the creation of a lightweight data security model for an IoT data transmission-based application for data transmission and storage in smart cities. The fundamental contribution of the proposed security model is the creation of a distinct hashing algorithm based on the specific pattern of the previous sequential change in value. The Delta Probabilistic Ha
APA, Harvard, Vancouver, ISO, and other styles
24

Prakash, A. John, and B. Lydia Elizabeth. "Pindex: Private multi-linked index for encrypted document retrieval." PLOS ONE 16, no. 8 (2021): e0256223. http://dx.doi.org/10.1371/journal.pone.0256223.

Full text
Abstract:
Cryptographic cloud storage is used to make optimal use of the cloud storage infrastructure to outsource sensitive and mission-critical data. The continuous growth of encrypted data outsourced to cloud storage requires continuous updating. Attacks like file-injection are reported to compromise confidentiality of the user as a consequence of information leakage during update. It is required that dynamic schemes provide forward privacy guarantees. Updates should not leak information to the untrusted server regarding the previously issued queries. Therefore, the challenge is to design an efficien
APA, Harvard, Vancouver, ISO, and other styles
25

Dadheech, Pankaj, Abolfazl Mehbodniya, Shivam Tiwari, et al. "Zika Virus Prediction Using AI-Driven Technology and Hybrid Optimization Algorithm in Healthcare." Journal of Healthcare Engineering 2022 (January 12, 2022): 1–13. http://dx.doi.org/10.1155/2022/2793850.

Full text
Abstract:
The Zika virus presents an extraordinary public health hazard after spreading from Brazil to the Americas. In the absence of credible forecasts of the outbreak's geographic scope and infection frequency, international public health agencies were unable to plan and allocate surveillance resources efficiently. An RNA test will be done on the subjects if they are found to be infected with Zika virus. By training the specified characteristics, the suggested Hybrid Optimization Algorithm such as multilayer perceptron with probabilistic optimization strategy gives forth a greater accuracy rate. The
APA, Harvard, Vancouver, ISO, and other styles
26

Gu, Zhen, Guoyin Zhang, and Chen Yang. "Horizontally Partitioned Data Publication with Differential Privacy." Security and Communication Networks 2022 (July 31, 2022): 1–13. http://dx.doi.org/10.1155/2022/7963004.

Full text
Abstract:
In this paper, we study the privacy-preserving data publishing problem in a distributed environment. The data contain sensitive information; hence, directly pooling and publishing the local data will lead to privacy leaks. To solve this problem, we propose a multiparty horizontally partitioned data publishing method under differential privacy (HPDP-DP). First, in order to make the noise level of the published data in the distributed scenario the same as in the centralized scenario, we use the infinite divisibility of the Laplace distribution to design a distributed noise addition scheme to per
APA, Harvard, Vancouver, ISO, and other styles
27

Rocha, Bruno Santos, Jose Antonio Moreira Xexeo, and Renato Hidaka Torres. "Post-quantum cryptographic algorithm identification using machine learning." Journal of Information Security and Cryptography (Enigma) 9, no. 1 (2022): 1–8. http://dx.doi.org/10.17648/jisc.v9i1.81.

Full text
Abstract:
This research presents a study on the identification of post-quantum cryptography algorithms through machine learning techniques. Plain text files were encoded by four post-quantum algorithms, participating in NIST's post-quantum cryptography standardization contest, in ECB mode. The resulting cryptograms were submitted to the NIST Statistical Test Suite to enable the creation of metadata files. These files provide information for six data mining algorithms to identify the cryptographic algorithm used for encryption. Identification performance was evaluated in samples of different sizes. The s
APA, Harvard, Vancouver, ISO, and other styles
28

Sharov, Vladyslav, and Olena Nikulina. "LAYERED DEFENSE IN COMMUNICATION SYSTEMS: JOINT USE OF VPN PROTOCOLS AND LINEAR BLOCK CODES." Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, no. 1 (13) (July 11, 2025): 112–16. https://doi.org/10.20998/2079-0023.2025.01.17.

Full text
Abstract:
With the rapid increase in the volume of transmitted information and the proliferation of distributed network infrastructures, the requirements for the security and reliability of communication channels are steadily intensifying. Traditional protection methods, such as virtual private networks (VPNs), are primarily aimed at ensuring confidentiality and authenticity through cryptographic algorithms, while typically lacking resilience to transmission-level errors arising from noise, interference, or hardware failures. In contrast, error correction codes—such as Hamming codes—are well-established
APA, Harvard, Vancouver, ISO, and other styles
29

Pinnapati, Surekha, and Prakasha Shivanna. "An efficient data compression and storage technique with key management authentication in cloud space." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 3 (2024): 1680. http://dx.doi.org/10.11591/ijeecs.v35.i3.pp1680-1687.

Full text
Abstract:
Cloud computing is one of the promising technologies that offers cost-effective choices for processing and storing the huge volumes of data. In today’s world, data is the most important asset that one can have but it needs to be handled and protected properly. Portability of data can be increased by reducing the size of the data to be stored because of the limited storage space. As a result, data compression has arisen significantly. Data compression is a useful technique for reducing data size and increasing the effectiveness of data transit and storage. Data compression reduces the size of a
APA, Harvard, Vancouver, ISO, and other styles
30

Surekha, Pinnapati Prakasha Shivanna. "An efficient data compression and storage technique with key management authentication in cloud space." Indonesian Journal of Electrical Engineering and Computer Science 35, no. 3 (2024): 1680–87. https://doi.org/10.11591/ijeecs.v35.i3.pp1680-1687.

Full text
Abstract:
Cloud computing is one of the promising technologies that offers cost-effective choices for processing and storing the huge volumes of data. In today’s world, data is the most important asset that one can have but it needs to be handled and protected properly. Portability of data can be increased by reducing the size of the data to be stored because of the limited storage space. As a result, data compression has arisen significantly. Data compression is a useful technique for reducing data size and increasing the effectiveness of data transit and storage. Data compression reduces the siz
APA, Harvard, Vancouver, ISO, and other styles
31

Solunke, Hiralal Bhaskar, Pawan Bhaladhare, and Amol Potgantwar. "Design of an iterative method for privacy : Preserving blockchain networks integrating dynamic routing with deep Q-networks and homomorphic encryption-based secure routing." Journal of Information and Optimization Sciences 46, no. 4-A (2025): 1081–90. https://doi.org/10.47974/jios-1893.

Full text
Abstract:
The burgeoning digital landscape has necessitated advancements in blockchain network optimization, particularly in enhancing privacy without compromising network efficiency. Existing blockchain routing mechanisms often fail to address comprehensive privacy concerns, typically offering suboptimal trade-offs between privacy preservation and network performance. The proposed model encompasses five innovative methods. First, Dynamic Routing with Deep Q-Networks (DR-DQN) leverages deep Q-learning to adapt routing paths dynamically based on network conditions and privacy requirements. It significant
APA, Harvard, Vancouver, ISO, and other styles
32

Khadidos, Adil O., S. Shitharth, Alaa O. Khadidos, K. Sangeetha, and Khaled H. Alyoubi. "Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism." Journal of Sensors 2022 (June 2, 2022): 1–17. http://dx.doi.org/10.1155/2022/8457116.

Full text
Abstract:
Providing security to the healthcare data stored in an IoT-cloud environment is one of the most challenging and demanding tasks in recent days. Because the IoT-cloud framework is constructed with an enormous number of sensors that are used to generate a massive amount of data, however, it is more susceptible to vulnerabilities and attacks, which degrades the security level of the network by performing malicious activities. Hence, Artificial Intelligence (AI) technology is the most suitable option for healthcare applications because it provides the best solution for improving the security and r
APA, Harvard, Vancouver, ISO, and other styles
33

Neamah Abbas, Farah, Mohanad Ridha Ghanim, and Rafal Naser Saleh. "Subject Review:AI-Driven Security in Quantum Machine Learning:Vulnerabilities,Threats, and Defenses." International Journal of Engineering Research and Advanced Technology 11, no. 04 (2025): 01–22. https://doi.org/10.31695/ijerat.2025.4.1.

Full text
Abstract:
Quantum Machine Learning (QML) has advanced significantly thanks to the combination of Quantum Computing (QC) with Artificial Intelligence (AI), hence releasing computational benefits over conventional methods. This synergy does, however, also bring fresh security flaws like adversarial attacks, quantum noise manipulation, and cryptographic weaknesses. This work offers a thorough investigation of QML security along with an examination of its special vulnerabilities resulting from hardware-induced faults, quantum variational circuits, and quantum data encoding. We methodically investigate adver
APA, Harvard, Vancouver, ISO, and other styles
34

Su, Man Nam1 and Tae Ho Cho2. "A SECURITY METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: AGAINST FALSE-REPORT INJECTION, FALSE-VOTE INJECTION, AND WORMHOLE ATTACKS." A SECURITY METHOD FOR MULTIPLE ATTACKS IN SENSOR NETWORKS: AGAINST FALSE-REPORT INJECTION, FALSE-VOTE INJECTION, AND WORMHOLE ATTACKS 02, dec (2014): 01–17. https://doi.org/10.5121/ieij.2014.2402.

Full text
Abstract:
In a large-scale wireless sensor network, damage spreads rapidly in the network when under false report injection, false votes injection, or wormhole attacks. These attacks cause finite energy resources to be drained, legitimate reports to be dropped, and data to be intercepted by adversary nodes. A probabilistic voting-based filtering scheme (PVFS) and localized encryption and authentication protocol (LEAP) can be used to cope with these attacks. When multiple attacks occur simultaneously, PVFS and LEAP should be operated together. But the concurrent application of PVFS and LEAP provides inef
APA, Harvard, Vancouver, ISO, and other styles
35

Dhivya. R, B. Srinivasan. "Probabilistic Deming Deep Recursive Network and Schmidt-Samoa Cryptosystem for Cyber Attack Detection and Secure Transmission in Wireless Networks." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 1427–50. https://doi.org/10.52783/cana.v32.4167.

Full text
Abstract:
A wireless network is an elastic data communications system that exploits wireless media to broadcast data over the network. In wireless network, cyber attack detection is vital for maintaining the security and integrity of communication systems since these networks are more susceptible to different threats due to their open, dynamic, and broadcast nature. Therefore, cyber-attacks are becoming more difficult, targeting systems that handle or store sensitive information. Due to the rapid increase in cyber-attacks, the design of a detection mechanism discovers the harmful effect and attacks. The
APA, Harvard, Vancouver, ISO, and other styles
36

Maheshbhai, Kansara. "Advancements in Cloud Database Migration: Current Innovations and Future Prospects for Scalable and Secure Transitions." Sage Science Review of Applied Machine Learning 7, no. 1 (2024): 127–43. https://doi.org/10.5281/zenodo.15033980.

Full text
Abstract:
<strong>Abstract</strong> Cloud database migration is a seminal transformation in modern data management, constituting the foundation of the evolution from legacy and on-premises environments to scalable and distributed cloud environments. This research paper presents a detailed study of the existing technical challenges and emerging methodologies in cloud database migration with special emphasis on automation, data integrity, and optimization of performance. The study covers advanced migration paradigms that employ state-of-the-art virtualization, container orchestration, and machine learning
APA, Harvard, Vancouver, ISO, and other styles
37

Yu, Yun William, and Griffin M. Weber. "Balancing Accuracy and Privacy in Federated Queries of Clinical Data Repositories: Algorithm Development and Validation." Journal of Medical Internet Research 22, no. 11 (2020): e18735. http://dx.doi.org/10.2196/18735.

Full text
Abstract:
Background Over the past decade, the emergence of several large federated clinical data networks has enabled researchers to access data on millions of patients at dozens of health care organizations. Typically, queries are broadcast to each of the sites in the network, which then return aggregate counts of the number of matching patients. However, because patients can receive care from multiple sites in the network, simply adding the numbers frequently double counts patients. Various methods such as the use of trusted third parties or secure multiparty computation have been proposed to link pa
APA, Harvard, Vancouver, ISO, and other styles
38

Sayeed, Aqsa, Chaman Verma, Neerendra Kumar, Neha Koul, and Zoltán Illés. "Approaches and Challenges in Internet of Robotic Things." Future Internet 14, no. 9 (2022): 265. http://dx.doi.org/10.3390/fi14090265.

Full text
Abstract:
The Internet of robotic things (IoRT) is the combination of different technologies including cloud computing, robots, Internet of things (IoT), artificial intelligence (AI), and machine learning (ML). IoRT plays a major role in manufacturing, healthcare, security, and transport. IoRT can speed up human development by a very significant percentage. IoRT allows robots to transmit and receive data to and from other devices and users. In this paper, IoRT is reviewed in terms of the related techniques, architectures, and abilities. Consequently, the related research challenges are presented. IoRT a
APA, Harvard, Vancouver, ISO, and other styles
39

Kjamilji, Artrim. "Techniques and Challenges while Applying Machine Learning Algorithms in Privacy Preserving Fashion." Proceeding International Conference on Science and Engineering 3 (April 30, 2020): xix. http://dx.doi.org/10.14421/icse.v3.600.

Full text
Abstract:
Nowadays many different entities collect data of the same nature, but in slightly different environments. In this sense different hospitals collect data about their patients’ symptoms and corresponding disease diagnoses, different banks collect transactions of their customers’ bank accounts, multiple cyber-security companies collect data about log files and corresponding attacks, etc. It is shown that if those different entities would merge their privately collected data in a single dataset and use it to train a machine learning (ML) model, they often end up with a trained model that outperfor
APA, Harvard, Vancouver, ISO, and other styles
40

"Identity Based Data Sharing and Profile Matching using Probabilistic Key in Cloud." International Journal of Recent Technology and Engineering 8, no. 6 (2020): 3076–80. http://dx.doi.org/10.35940/ijrte.f8434.038620.

Full text
Abstract:
Cloud technology is popular since the utilizations and their information are expanding hugely step by step. It gives usefulness to overseeing data information in a conveyed and pervasive way supporting many platform. Data sharing and security problem are the principle issue to the increasing use of health care, since health information is delicate. However issues, for example, risks of privacy exposure ,versatility in key administration, adaptable access and effective uses denial always been the most significant difficulties for accomplishing goodgrained cryptographically upheld information ac
APA, Harvard, Vancouver, ISO, and other styles
41

"A Symmetric Searchable Encryption Identification of Data on Probabilistic Trapdoors." International Journal of Engineering and Advanced Technology 9, no. 3 (2020): 3880–83. http://dx.doi.org/10.35940/ijeat.c6389.029320.

Full text
Abstract:
Accessible Encryption (SE) permits a client in accordance with transfer records in accordance with the astronaut and according to seem thru it of a faraway manner while defending the security concerning each the statistics yet the inquiries. Right now, entrust a generative then the simple in imitation of actualize Symmetric Searchable Encryption Scheme because instance (SSE) [4]. This tale takes the some round concerning correspondence namely O(n) instances on calculations upstairs n range regarding records . We likewise presented some other variety of Search Pattern Privacy, as gives a percen
APA, Harvard, Vancouver, ISO, and other styles
42

Nagnath, Ingale Ashwini. "A Modified Approach on Security Analysis Using Probabilistic Order Preserving Encryption Based on Cloud Data Serach." International Journal Of Engineering And Computer Science, January 30, 2017. http://dx.doi.org/10.18535/ijecs/v6i1.58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Naga Srinivasu, Parvathaneni, Ranjit Panigrahi, Ashish Singh, and Akash Kumar Bhoi. "Probabilistic Buckshot Driven Cluster Head Identification and Accumulative Data Encryption in WSN." Journal of Circuits, Systems and Computers, June 17, 2022. http://dx.doi.org/10.1142/s0218126622503030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

"Enhanced Security of Encrypted Text by KDMT: Key-Domain Maximization Technique." International Journal of Recent Technology and Engineering 8, no. 5 (2020): 1385–88. http://dx.doi.org/10.35940/ijrte.e6326.018520.

Full text
Abstract:
Encryption-decryption techniques have been the backbone of network security in the modern era of wireless transmission of data. We present here a more secured encryption-decryption method based on the maximization of key domain in finite field. The proposed technique uses a random primary key to fetch the encryption-decryption key-pair furnished by a unique decomposition. A secondary key taken from a subdomain with specific property is used to add more randomness in the encrypted text structure. A probabilistic comparison of key prediction by hacker is also discussed to justify the added secur
APA, Harvard, Vancouver, ISO, and other styles
45

M. Swetha and G. Appa Rao. "Hybrid Ensemble Lightweight Cryptosystem for Internet of Medical Things Security." International Journal of Computational and Experimental Science and Engineering 10, no. 4 (2024). https://doi.org/10.22399/ijcesen.625.

Full text
Abstract:
Internet of Medical Things (IoMT) is a fast-developing area that includes the use of connected medical devices to enhance patient care and expedite the procedures involved in the delivery of healthcare. Concerns about the safety and confidentiality of patient information are a roadblock to the broad use of telemedicine technologies like IoMT. Encryption is an essential part of IoMT security, and there is a wide variety of encryption methods that are used to safeguard sensitive patient data. This work implemented a hybrid ensemble lightweight cryptosystem (HELC) using probabilistic rivest ciphe
APA, Harvard, Vancouver, ISO, and other styles
46

Andreou, Andreas, Constandinos X. Mavromoustakis, George Mastorakis, et al. "Towards an optimized security approach to IoT devices with confidential healthcare data exchange." Multimedia Tools and Applications 80 (March 26, 2021). https://doi.org/10.1007/s11042-021-10827-x.

Full text
Abstract:
Reliable data exchange and efficient image transfer are currently significant research challenges in health care systems. To incentivize data exchange within the Internet of Things (IoT) framework, we need to ensure data sovereignty by facilitating secure data exchange between trusted parties. The security and reliability of data-sharing infrastructure require a community of trust. Therefore, this paper introduces an encryption frame based on data fragmentation. It also presents a novel, deterministic grey-scale optical encryption scheme based on fundamental mathematics. The objective is to us
APA, Harvard, Vancouver, ISO, and other styles
47

Jalasri, M., and L. Lakshmanan. "Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm." Cluster Computing, May 17, 2022. http://dx.doi.org/10.1007/s10586-022-03606-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Thurairasu, Lisa, and Nelson Chong. "Information Management at a Health Services Research Organization in Toronto, Ontario, Canada: Moving from Identifiable Data to Coded Data." International Journal of Population Data Science 1, no. 1 (2017). http://dx.doi.org/10.23889/ijpds.v1i1.307.

Full text
Abstract:
ABSTRACTObjectivesA health services research organization in Toronto, Ontario, Canada conducts population-based research to improve the health of Canadians in seven main areas: (1) cancer, (2) cardiovascular disease, (3) chronic disease and pharmacology, (4) health system planning and evaluation, (5) kidney, dialysis and transplantation, (6) mental health and addictions, and (7) primary care and population health. The Information Management (IM) team within the Data Quality and Information Management (DQIM) department at our non-profit organization is an integral component for upholding privac
APA, Harvard, Vancouver, ISO, and other styles
49

Moses, Oseghale Ikeakhe. "QUANTUM AI FOR NEXT-GENERATION SECURITY IN FINTECH, CYBERSECURITY, AND HEALTHCARE." International Journal of Engineering Technology Research & Management (ijetrm) 07, no. 08 (2023). https://doi.org/10.5281/zenodo.14837113.

Full text
Abstract:
Quantum Artificial Intelligence (Quantum AI) is poised to revolutionize FinTech, Cybersecurity, and Healthcare byenhancing data encryption, security resilience, and computational efficiency. Quantum algorithms such as Shor&rsquo;sAlgorithm and Grover&rsquo;s Algorithm provide an exponential speed-up in solving cryptographic and security challenges.This research explores the integration of Quantum AI in fraud detection, quantum-secure encryption protocols, andmedical AI decision-making. Our proposed Quantum AI security model demonstrates a 98% reduction in cybervulnerabilities while improving A
APA, Harvard, Vancouver, ISO, and other styles
50

Anwarbasha, H., S. Sasi Kumar, and D. Dhanasekaran. "An efficient and secure protocol for checking remote data integrity in multi-cloud environment." Scientific Reports 11, no. 1 (2021). http://dx.doi.org/10.1038/s41598-021-93073-3.

Full text
Abstract:
AbstractIn cloud environment, huge quantity of data has been generated at each and every second. In order to manage the data, cloud service provider makes use of multi-cloud platform to fulfill the requirement. The service provider cooperatively operates altogether for the accessibility of resources and are improvised by implementing the dynamic operation that can run at a time through the Multi-cloud environment. This paper presents a Dynamic Level Based Integrity Checking Protocol (DA-ICP) for storing data in multicloud environment. The proposed method introduces Provable Data Possession (PD
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!