يعرض 181 - 200 نتائج من 272 نتيجة بحث عن 'encryption algorithm based', وقت الاستعلام: 0.23s تنقيح النتائج
  1. 181
  2. 182

    Proteinoid-based encryption process. The setup involves importing measurement data, including voltage, capacitance, impedance, and resistance, from various proteinoid samples. حسب Panagiotis Mougkogiannis (17002143)

    منشور في 2025
    "…<p>A designated proteinoid sample is selected as the encryption key based on its unique electrical properties. …"
  3. 183

    Portable Library for Homomorphic Encrypted Machine Learning on FPGA Accelerated Cloud Cyberinfrastructure حسب Zhihan Xu (17049357)

    منشور في 2025
    "…<p dir="ltr">Data privacy has had implications for deploying data-sensitive machine learning (ML) inference applications to cloud cyberinfrastructure (CI). Homomorphic Encryption (HE), which allows arbitrary computations on encrypted data, provides a potential solution to these challenges. …"
  4. 184

    Security algorithm framework. حسب Ali Shahzad (15251641)

    منشور في 2024
    "…We proposed a blockchain-based method for secure EHR management and integrated Ciphertext-Policy Attribute-Based Encryption (CP-ABE) for fine-grained access control. …"
  5. 185

    Example of byte substitution Process. حسب Mingyi Huo (21743594)

    منشور في 2025
    "…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …"
  6. 186

    Example of S-box. حسب Mingyi Huo (21743594)

    منشور في 2025
    "…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …"
  7. 187

    Example of addroundkey process. حسب Mingyi Huo (21743594)

    منشور في 2025
    "…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …"
  8. 188

    Bifurcation diagram analysis results. حسب Mingyi Huo (21743594)

    منشور في 2025
    "…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …"
  9. 189

    Information entropy analysis results. حسب Mingyi Huo (21743594)

    منشور في 2025
    "…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …"
  10. 190

    Lyapunov exponent of different chaotic maps. حسب Mingyi Huo (21743594)

    منشور في 2025
    "…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …"
  11. 191
  12. 192

    HE_FaceNet error rate. حسب Zhigang Song (113445)

    منشور في 2025
    الموضوعات:
  13. 193
  14. 194
  15. 195
  16. 196

    HE_FaceNet frame diagram. حسب Zhigang Song (113445)

    منشور في 2025
    الموضوعات:
  17. 197
  18. 198
  19. 199

    Experimental images&Table1-10&Figure1-15.docx حسب Feixian Liu (21987380)

    منشور في 2025
    "…<p dir="ltr">A Robust Color Image Encryption Algorithm Based on 2D-SQSM Hyperchaotic Map and Cyclic Shift Scrambling</p>…"
  20. 200

    This figure shows a condensed process. حسب Panagiotis Mougkogiannis (17002143)

    منشور في 2025
    "…<p>It encrypts and decrypts the message “Hello, World!” using a novel, proteinoid-based cryptographic system. …"