2024 Vol.7 Apr.N02 |
---|
|
Reference: [1] Shu L .Design of Sensitive Information Encryption and Decryption System Based on Branch Obfuscation Algorithm[J].2022 11th International Conference of Information and Communication Technology (ICTech)), 2022:330-334. [2] Cho H H , Tsai M Y , Tseng F H ,et al. Improving Randomness of Symmetric Encryption for Consumer Privacy Using Metaheuristic-Based Framework[J].IEEE consumer electronics magazine, 2022(11-1). [3] Lapworth L .Parallel encryption of input and output data for HPC applications:[J]. Applications, 2022, 36(2):231-250. [4] Pawar A , Ghumbre S , Jogdand R .Performance Analysis and Systematic Review of Privacy Preservation-Based Authentication Models and Cryptographic- Based Data Protocols[J].Int. J. Inf. Secur. Priv. 2022, 16:1-24. [5] Guo Q , Tian Y L , Wan L .Blockchain Data Controlled Sharing Scheme Based on Proxy Re-Encryption[J].Acta Electronica Sinica, 2023, 51(2):477-488. [6] Gupta R , Dharadhar S , Churi P .CloudJS: novel cloud-based design framework for text-file encryption[J]. 472-485. [7] Teng Y , Yang S , Liu L ,et al. Nanoscale storage encryption: data storage in synthetic DNA using a cryptosystem with a neural network[J]. Life sciences, 2022, 65(8):1673-1676. [8] Ebinazer S E , Savarimuthu N , Bhanu S M S .A hybrid encryption for secure data deduplication the cloud[J].Int. J. Cloud Comput. 2023, 12:295-307. [9] Chang R I , Chang Y T , Wang C H .Outsourced K-means Clustering for High-Dimensional Data Analysis based on Homomorphic Encryption[J].J. Inf. Sci. Eng. 2023, 39:525-548. [10] Shi J , Zhao X .Anti-leakage method of network sensitive information data based on homomorphic encryption[J].Journal of Intelligent Systems, 2023 , 32(1):2517-39. [11] Yan R , Zheng Y , Yu N ,et al.Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy[J].Big Data Mining and Analytics, 2024, 7(1):131-141. [12] Almoysheer N , Humayun M , El-Aziz A A B ,et al.Enhancing Cloud Data Security using Multilevel Encryption Techniques Enhancing Cloud Data Security using Multilevel Encryption Techniques[J].Turkish Online Journal of Educational Technology, 2021, 12(3):5140-5154. [13] Setiadi D , Rachmawanto E H , Zulfiningrum R .Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling[J].J. King Saud Univ. Comput. Inf. Sci. 2022, 34:6818-6828. [14] Garg P , Jain A .A novel approach to secure biometric data using integer wavelet transform, chaotic sequences and improved logistic system-based watermarking[J].Int. J. Comput. Appl. Technol. 2023, 71:340-351. [15] Chen X, Gu W. Simulation of Multilayer Chaotic Sequence Encryption Method for Mobile Office Data[J]. Computer Simulation,2023(5)159-162,167.
|
Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16