期刊文献+
共找到894篇文章
< 1 2 45 >
每页显示 20 50 100
SHARP MORREY REGULARITY THEORY FOR A FOURTH ORDER GEOMETRICAL EQUATION
1
作者 向长林 郑高峰 《Acta Mathematica Scientia》 SCIE CSCD 2024年第2期420-430,共11页
This paper is a continuation of recent work by Guo-Xiang-Zheng[10].We deduce the sharp Morrey regularity theory for weak solutions to the fourth order nonhomogeneous Lamm-Rivière equation △^{2}u=△(V▽u)+div(w▽... This paper is a continuation of recent work by Guo-Xiang-Zheng[10].We deduce the sharp Morrey regularity theory for weak solutions to the fourth order nonhomogeneous Lamm-Rivière equation △^{2}u=△(V▽u)+div(w▽u)+(▽ω+F)·▽u+f in B^(4),under the smallest regularity assumptions of V,ω,ω,F,where f belongs to some Morrey spaces.This work was motivated by many geometrical problems such as the flow of biharmonic mappings.Our results deepens the Lp type regularity theory of[10],and generalizes the work of Du,Kang and Wang[4]on a second order problem to our fourth order problems. 展开更多
关键词 fourth order elliptic equation regularity theory Morrey space decay estimates Riesz potential
下载PDF
Efficient single-pixel imaging encrypted transmission based on 3D Arnold transformation
2
作者 梁振宇 王朝瑾 +4 位作者 王阳阳 高皓琪 朱东涛 许颢砾 杨星 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期378-386,共9页
Single-pixel imaging(SPI)can transform 2D or 3D image data into 1D light signals,which offers promising prospects for image compression and transmission.However,during data communication these light signals in public ... Single-pixel imaging(SPI)can transform 2D or 3D image data into 1D light signals,which offers promising prospects for image compression and transmission.However,during data communication these light signals in public channels will easily draw the attention of eavesdroppers.Here,we introduce an efficient encryption method for SPI data transmission that uses the 3D Arnold transformation to directly disrupt 1D single-pixel light signals and utilizes the elliptic curve encryption algorithm for key transmission.This encryption scheme immediately employs Hadamard patterns to illuminate the scene and then utilizes the 3D Arnold transformation to permutate the 1D light signal of single-pixel detection.Then the transformation parameters serve as the secret key,while the security of key exchange is guaranteed by an elliptic curve-based key exchange mechanism.Compared with existing encryption schemes,both computer simulations and optical experiments have been conducted to demonstrate that the proposed technique not only enhances the security of encryption but also eliminates the need for complicated pattern scrambling rules.Additionally,this approach solves the problem of secure key transmission,thus ensuring the security of information and the quality of the decrypted images. 展开更多
关键词 single-pixel imaging 3D Arnold transformation elliptic curve encryption image encryption
下载PDF
THE WEIGHTED KATO SQUARE ROOT PROBLEMOF ELLIPTIC OPERATORS HAVING A BMOANTI-SYMMETRICPART
3
作者 马文贤 杨四辈 《Acta Mathematica Scientia》 SCIE CSCD 2024年第2期532-550,共19页
Let n≥2 and let L be a second-order elliptic operator of divergence form with coefficients consisting of both an elliptic symmetric part and a BMO anti-symmetric part in ℝ^(n).In this article,we consider the weighted... Let n≥2 and let L be a second-order elliptic operator of divergence form with coefficients consisting of both an elliptic symmetric part and a BMO anti-symmetric part in ℝ^(n).In this article,we consider the weighted Kato square root problem for L.More precisely,we prove that the square root L^(1/2)satisfies the weighted L^(p)estimates||L^(1/2)(f)||L_(ω)^p(R^(n))≤C||■f||L_(ω)^p(R^(n);R^(n))for any p∈(1,∞)andω∈Ap(ℝ^(n))(the class of Muckenhoupt weights),and that||■f||L_(ω)^p(R^(n);R^(n))≤C||L^(1/2)(f)||L_(ω)^p(R^(n))for any p∈(1,2+ε)andω∈Ap(ℝ^(n))∩RH_(2+ε/p),(R^(n))(the class of reverse Hölder weights),whereε∈(0,∞)is a constant depending only on n and the operator L,and where(2+ε/p)'denotes the Hölder conjugate exponent of 2+ε/p.Moreover,for any given q∈(2,∞),we give a sufficient condition to obtain that||■f||L_(ω)^p(R^(n);R^(n))≤C||L^(1/2)(f)||L_(ω)^p(R^(n))for any p∈(1,q)andω∈A_(p)(R^(n))∩pRH_(q/p),(R^(n)).As an application,we prove that when the coefficient matrix A that appears in L satisfies the small BMO condition,the Riesz transform∇L^(−1/2)is bounded on L_(ω)^(p)(ℝ^(n))for any given p∈(1,∞)andω∈Ap(ℝ^(n)).Furthermore,applications to the weighted L^(2)-regularity problem with the Dirichlet or the Neumann boundary condition are also given. 展开更多
关键词 elliptic operator Kato square root problem Muckenhoupt weight Riesz transform reverse Hölder inequality
下载PDF
Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
4
作者 田婧希 金松昌 +2 位作者 张晓强 杨绍武 史殿习 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期292-304,共13页
Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.... Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.In this paper,a novel Fibonacci sine exponential map is designed,the hyperchaotic performance of which is particularly suitable for image encryption algorithms.An encryption algorithm tailored for handling the multi-band attributes of remote sensing images is proposed.The algorithm combines a three-dimensional synchronized scrambled diffusion operation with chaos to efficiently encrypt multiple images.Moreover,the keys are processed using an elliptic curve cryptosystem,eliminating the need for an additional channel to transmit the keys,thus enhancing security.Experimental results and algorithm analysis demonstrate that the algorithm offers strong security and high efficiency,making it suitable for remote sensing image encryption tasks. 展开更多
关键词 hyperchaotic system elliptic curve cryptosystem(ECC) 3D synchronous scrambled diffusion remote sensing image unmanned aerial vehicle(UAV)
下载PDF
Sensitive Information Security Based on Elliptic Curves
5
作者 Nadine Nibigira Vincent Havyarimana Zhu Xiao 《World Journal of Engineering and Technology》 2024年第2期274-285,共12页
The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of ... The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of security while optimizing the efficiency of computer resources. This study focuses on how elliptic curves cryptography helps to protect sensitive data. Text is encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. The elliptic curves cryptography of this study is better than using a 256-bit RSA key. To achieve equivalent protection by using the elliptic curves cryptography, several Python libraries such as cryptography, pycryptodome, pyQt5, secp256k1, etc. were used. These technologies are used to develop a software based on elliptic curves. If built, the software helps to encrypt and decrypt data such as a text messages and it offers the authentication for the communication. 展开更多
关键词 CRYPTOGRAPHY Elliptic Curves Digital Security Data Sensitive Data IMPLEMENTATION
下载PDF
The Regularity of Solutions to Mixed Boundary Value Problems of Second-Order Elliptic Equations with Small Angles
6
作者 Mingyu Wu 《Journal of Applied Mathematics and Physics》 2024年第4期1043-1049,共7页
This paper considers the regularity of solutions to mixed boundary value problems in small-angle regions for elliptic equations. By constructing a specific barrier function, we proved that under the assumption of suff... This paper considers the regularity of solutions to mixed boundary value problems in small-angle regions for elliptic equations. By constructing a specific barrier function, we proved that under the assumption of sufficient regularity of boundary conditions and coefficients, as long as the angle is sufficiently small, the regularity of the solution to the mixed boundary value problem of the second-order elliptic equation can reach any order. 展开更多
关键词 Mixed Boundary Value Problems for Elliptic Equations Small-Angle Boundary Value Problems Regularity of Solutions to Elliptic Equations
下载PDF
THE EXISTENCE AND STABILITY OF NORMALIZED SOLUTIONS FOR A BI-HARMONIC NONLINEAR SCHR?DINGER EQUATION WITH MIXED DISPERSION
7
作者 罗庭健 郑世骏 朱世辉 《Acta Mathematica Scientia》 SCIE CSCD 2023年第2期539-563,共25页
In this paper,we study the ground state standing wave solutions for the focusing bi-harmonic nonlinear Schrodinger equation with aμ-Laplacian term(BNLS).Such BNLS models the propagation of intense laser beams in a bu... In this paper,we study the ground state standing wave solutions for the focusing bi-harmonic nonlinear Schrodinger equation with aμ-Laplacian term(BNLS).Such BNLS models the propagation of intense laser beams in a bulk medium with a second-order dispersion term.Denoting by Qpthe ground state for the BNLS withμ=0,we prove that in the mass-subcritical regime p∈(1,1+8/d),there exist orbit ally stable ground state solutions for the BNLS when p∈(-λ0,∞)for someλ0=λ0(p,d,‖Qp‖L2)>0.Moreover,in the mass-critical case p=1+8/d,we prove the orbital stability on a certain mass level below‖Q*‖L2,provided thatμ∈(-λ1,0),where■and Q*=Q1+8/d.The proofs are mainly based on the profile decomposition and a sharp Gagliardo-Nirenberg type inequality.Our treatment allows us to fill the gap concerning the existence of the ground states for the BNLS when p is negative and p∈(1,1+8/d]. 展开更多
关键词 elliptic equations bi-harmonic operator normalized solutions profile decomposition
下载PDF
Asymmetric Key Cryptosystem for Image Encryption by Elliptic Curve over Galois Field GF(2^(n))
8
作者 Mohammad Mazyad Hazzazi Hafeez Ur Rehman +1 位作者 Tariq Shah Hajra Younas 《Computers, Materials & Continua》 SCIE EI 2023年第8期2033-2060,共28页
Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem.In this paper,we introduce an asymmetric key algorithm for specifically processing images with larger bit valu... Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem.In this paper,we introduce an asymmetric key algorithm for specifically processing images with larger bit values.To overcome the separate flaws of elliptic curve cryptography(ECC)and the Hill cipher(HC),we present an approach to picture encryption by combining these two encryption approaches.In addition,to strengthen our scheme,the group laws are defined over the rational points of a given elliptic curve(EC)over a Galois field(GF).The exclusive-or(XOR)function is used instead of matrix multiplication to encrypt and decrypt the data which also refutes the need for the inverse of the key matrix.By integrating the inverse function on the pixels of the image,we have improved system security and have a wider key space.Furthermore,through comprehensive analysis of the proposed scheme with different available analyses and standard attacks,it is confirmed that our proposed scheme provides improved speed,security,and efficiency. 展开更多
关键词 Elliptic curve Galois field group law hill cipher
下载PDF
Sharp power-type Heronian and Lehmer means inequalities for the complete elliptic integrals
9
作者 ZHAO Tie-hong CHU Yu-ming 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2023年第3期467-474,共8页
In the article,we prove that the inequalities H_(p)(K(r);E(r))>π/2;L_(q)(K(r);E(r))>π/2 hold for all r 2(0;1)if and only if p≥3=4 and q≥3=4,where Hp(a;b)and Lq(a;b)are respectively the p-th power-type Heroni... In the article,we prove that the inequalities H_(p)(K(r);E(r))>π/2;L_(q)(K(r);E(r))>π/2 hold for all r 2(0;1)if and only if p≥3=4 and q≥3=4,where Hp(a;b)and Lq(a;b)are respectively the p-th power-type Heronian mean and q-th Lehmer mean of a and b,and K(r)and E(r)are respectively the complete elliptic integrals of the first and second kinds. 展开更多
关键词 power-type Heronian mean Lehmer means complete elliptic integrals
下载PDF
A Low-Cost and High-Performance Cryptosystem Using Tripling-Oriented Elliptic Curve
10
作者 Mohammad Alkhatib Wafa S.Aldalbahy 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1807-1831,共25页
Developing a high-performance public key cryptosystem is crucial for numerous modern security applications.The Elliptic Curve Cryptosystem(ECC)has performance and resource-saving advantages compared to other types of ... Developing a high-performance public key cryptosystem is crucial for numerous modern security applications.The Elliptic Curve Cryptosystem(ECC)has performance and resource-saving advantages compared to other types of asymmetric ciphers.However,the sequential design implementation for ECC does not satisfy the current applications’performance requirements.Therefore,several factors should be considered to boost the cryptosystem performance,including the coordinate system,the scalar multiplication algo-rithm,and the elliptic curve form.The tripling-oriented(3DIK)form is imple-mented in this work due to its minimal computational complexity compared to other elliptic curves forms.This experimental study explores the factors playing an important role in ECC performance to determine the best combi-nation that leads to developing high-speed ECC.The proposed cryptosystem uses parallel software implementation to speed up ECC performance.To our knowledge,previous studies have no similar software implementation for 3DIK ECC.Supported by using parallel design,projective coordinates,and a fast scalar multiplication algorithm,the proposed 3DIK ECC improved the speed of the encryption process compared with other counterparts and the usual sequential implementation.The highest performance level for 3DIK ECC was achieved when it was implemented using the Non-Adjacent Form algorithm and homogenous projection.Compared to the costly hardware implementations,the proposed software implementation is cost effective and can be easily adapted to other environments.In addition,the power con-sumption of the proposed ECC is analyzed and compared with other known cryptosystems.thus,the current study presents a detailed overview of the design and implementation of 3DIK ECC. 展开更多
关键词 Security CRYPTOGRAPHY elliptic curves software implement greatation MULTITHREADING
下载PDF
Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography
11
作者 B.Murugeshwari D.Selvaraj +1 位作者 K.Sudharson S.Radhika 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期839-851,共13页
Protecting the privacy of data in the multi-cloud is a crucial task.Data mining is a technique that protects the privacy of individual data while mining those data.The most significant task entails obtaining data from... Protecting the privacy of data in the multi-cloud is a crucial task.Data mining is a technique that protects the privacy of individual data while mining those data.The most significant task entails obtaining data from numerous remote databases.Mining algorithms can obtain sensitive information once the data is in the data warehouse.Many traditional algorithms/techniques promise to provide safe data transfer,storing,and retrieving over the cloud platform.These strategies are primarily concerned with protecting the privacy of user data.This study aims to present data mining with privacy protection(DMPP)using precise elliptic curve cryptography(PECC),which builds upon that algebraic elliptic curve infinitefields.This approach enables safe data exchange by utilizing a reliable data consolidation approach entirely reliant on rewritable data concealing techniques.Also,it outperforms data mining in terms of solid privacy procedures while maintaining the quality of the data.Average approximation error,computational cost,anonymizing time,and data loss are considered performance measures.The suggested approach is practical and applicable in real-world situations according to the experimentalfindings. 展开更多
关键词 Data mining CRYPTOGRAPHY privacy preserving elliptic curve information security
下载PDF
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element
12
作者 Chintan Patel Ali Kashif Bashir +1 位作者 Ahmad Ali AlZubi Rutvij Jhaveri 《Digital Communications and Networks》 SCIE CSCD 2023年第2期358-366,共9页
Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product processing.IIoT suffers from various challenges,and security is one of the key challenge among those challe... Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product processing.IIoT suffers from various challenges,and security is one of the key challenge among those challenges.Authentication and access control are two notable challenges for any IIoT based industrial deployment.Any IoT based Industry 4.0 enterprise designs networks between hundreds of tiny devices such as sensors,actuators,fog devices and gateways.Thus,articulating a secure authentication protocol between sensing devices or a sensing device and user devices is an essential step in IoT security.In this paper,first,we present cryptanalysis for the certificate-based scheme proposed for a similar environment by Das et al.and prove that their scheme is vulnerable to various traditional attacks such as device anonymity,MITM,and DoS.We then put forward an interdevice authentication scheme using an ECC(Elliptic Curve Cryptography)that is highly secure and lightweight compared to other existing schemes for a similar environment.Furthermore,we set forth a formal security analysis using the random oracle-based ROR model and informal security analysis over the Doleve-Yao channel.In this paper,we present comparison of the proposed scheme with existing schemes based on communication cost,computation cost and security index to prove that the proposed EBAKE-SE is highly efficient,reliable,and trustworthy compared to other existing schemes for an inter-device authentication.At long last,we present an implementation for the proposed EBAKE-SE using MQTT protocol. 展开更多
关键词 Internet of things AUTHENTICATION Elliptic curve cryptography Secure key exchange Message Queuing telemetry transport
下载PDF
Automated Irrigation System Using Improved Fuzzy Neural Network in Wireless Sensor Networks
13
作者 S.Sakthivel V.Vivekanandhan M.Manikandan 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期853-866,共14页
Irrigation plays a significant role in various agricultural cropping methods deployed in semiarid and arid regions where valuable water applications and managing are considered crucial concerns.Multiple factors such a... Irrigation plays a significant role in various agricultural cropping methods deployed in semiarid and arid regions where valuable water applications and managing are considered crucial concerns.Multiple factors such as weather,soil,water,and crop data need to be considered for irrigation maintenance in an efficient besides uniform manner from multifaceted and different information-based systems.A Multi-Agent System(MAS)has been proposed recently based on diverse agent subsystems with definite objectives for attaining global MAS objective and is deployed on Cloud Computing paradigm capable of gathering information from Wireless Sensor Networks(WSNs)positioned in rice,cotton,cassava crops for knowledge discovery and decision making.The radial basis function network has been used for irrigation prediction.However,in recent work,the security of data has not focused on where intruder involvement might corrupt the data at the time of data transferring to the cloud,which would affect the accuracy of decision making.To handle the above mentioned issues,an efficient method for irrigation prediction is used in this work.The factors considered for decision making are soil moisture,temperature,plant height,root depth.The above-mentioned data will be gathered from the sensors that are attached to the cropfield.Sensed data will be forwarded to the local server,where data encryption will be performed using Adaptive Elliptic Curve Cryptography(AECC).After the encryption process,the data will be forwarded to the cloud.Then the data stored in the cloud will be decrypted key before being given to the deci-sion-making module.Finally,the uniform distribution-based fuzzy neural network is formulated based on the received data information in the decisionmaking module.Thefinal decision regarding the level of water required for cropfields would be taken.Based on this outcome,the water volve opening duration and the level of fertilizers required will be considered.Experimental results demonstrate the effectiveness of the proposed model for the United States Geological Survey(USGS)database in terms of precision,accuracy,recall,and packet delivery ratio. 展开更多
关键词 IRRIGATION multi-agent system precision irrigation ACCURACY elliptic curve cryptography ENCRYPTION wireless sensor networks fertilizers
下载PDF
Configurations of Shock Regular Reflection by Straight Wedges
14
作者 Qin Wang Junhe Zhou 《Communications on Applied Mathematics and Computation》 2023年第3期1256-1273,共18页
We are concerned with the shock regular reflection configurations of unsteady global solutions for a plane shock hitting a symmetric straight wedge.It has been known that patterns of the shock reflection are various a... We are concerned with the shock regular reflection configurations of unsteady global solutions for a plane shock hitting a symmetric straight wedge.It has been known that patterns of the shock reflection are various and complicated,including the regular and the Mach reflection.Most of the fundamental issues for the shock reflection have not been understood.Recently,there are great progress on the mathematical theory of the shock regular reflection problem,especially for the global existence,uniqueness,and structural stability of solutions.In this paper,we show that there are two more possible configurations of the shock regular reflection besides known four configurations.We also give a brief proof of the global existence of solutions. 展开更多
关键词 Shock regular reflection Transonic shock Prandtl-Meyer reflection Degenerate elliptic equation Two-dimensional Euler equations
下载PDF
Resonant interactions among two-dimensional nonlinear localized waves and lump molecules for the(2+1)-dimensional elliptic Toda equation
15
作者 庞福忠 葛根哈斯 赵雪梅 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第5期200-217,共18页
The(2+1)-dimensional elliptic Toda equation is a high-dimensional generalization of the Toda lattice and a semidiscrete Kadomtsev–Petviashvili I equation.This paper focuses on investigating the resonant interactions ... The(2+1)-dimensional elliptic Toda equation is a high-dimensional generalization of the Toda lattice and a semidiscrete Kadomtsev–Petviashvili I equation.This paper focuses on investigating the resonant interactions between two breathers,a breather/lump and line solitons as well as lump molecules for the(2+1)-dimensional elliptic Toda equation.Based on the N-soliton solution,we obtain the hybrid solutions consisting of line solitons,breathers and lumps.Through the asymptotic analysis of these hybrid solutions,we derive the phase shifts of the breather,lump and line solitons before and after the interaction between a breather/lump and line solitons.By making the phase shifts infinite,we obtain the resonant solution of two breathers and the resonant solutions of a breather/lump and line solitons.Through the asymptotic analysis of these resonant solutions,we demonstrate that the resonant interactions exhibit the fusion,fission,time-localized breather and rogue lump phenomena.Utilizing the velocity resonance method,we obtain lump–soliton,lump–breather,lump–soliton–breather and lump–breather–breather molecules.The above works have not been reported in the(2+1)-dimensional discrete nonlinear wave equations. 展开更多
关键词 (2+1)-dimensional elliptic Toda equation resonant interaction lump molecules
下载PDF
Smart Grid Communication Under Elliptic Curve Cryptography
16
作者 B.Prabakaran T.R.Sumithira V.Nagaraj 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期2333-2347,共15页
Smart Grids(SGs)are introduced as a solution for standard power dis-tribution.The significant capabilities of smart grids help to monitor consumer behaviors and power systems.However,the delay-sensitive network faces n... Smart Grids(SGs)are introduced as a solution for standard power dis-tribution.The significant capabilities of smart grids help to monitor consumer behaviors and power systems.However,the delay-sensitive network faces numer-ous challenges in which security and privacy gain more attention.Threats to trans-mitted messages,control over smart grid information and user privacy are the major concerns in smart grid security.Providing secure communication between the service provider and the user is the only possible solution for these security issues.So,this research work presents an efficient mutual authentication and key agreement protocol for smart grid communication using elliptic curve crypto-graphy which is robust against security threats.A trust authority module is intro-duced in the security model apart from the user and service provider for authentication.The proposed approach performance is verified based on different security features,communication costs,and computation costs.The comparative analysis of experimental results demonstrates that the proposed authentication model attains better performance than existing state of art of techniques. 展开更多
关键词 Smart grid elliptic curve cryptography key management mutual authentication
下载PDF
Discrete GWO Optimized Data Aggregation for Reducing Transmission Rate in IoT
17
作者 S.Siamala Devi K.Venkatachalam +1 位作者 Yunyoung Nam Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期1869-1880,共12页
The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies.Early diagnosis of many diseases will improve the patient ... The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies.Early diagnosis of many diseases will improve the patient life.The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things(IoT),Wireless Sensor Networks(WSN),Embedded systems,Deep learning approaches and Optimization and aggregation methods.The data generated through these technologies will demand the bandwidth,data rate,latency of the network.In this proposed work,efficient discrete grey wolf optimization(DGWO)based data aggregation scheme using Elliptic curve Elgamal with Message Authentication code(ECEMAC)has been used to aggregate the parameters generated from the wearable sensor devices of the patient.The nodes that are far away from edge node will forward the data to its neighbor cluster head using DGWO.Aggregation scheme will reduce the number of transmissions over the network.The aggregated data are preprocessed at edge node to remove the noise for better diagnosis.Edge node will reduce the overhead of cloud server.The aggregated data are forward to cloud server for central storage and diagnosis.This proposed smart diagnosis will reduce the transmission cost through aggrega-tion scheme which will reduce the energy of the system.Energy cost for proposed system for 300 nodes is 0.34μJ.Various energy cost of existing approaches such as secure privacy preserving data aggregation scheme(SPPDA),concealed data aggregation scheme for multiple application(CDAMA)and secure aggregation scheme(ASAS)are 1.3μJ,0.81μJ and 0.51μJ respectively.The optimization approaches and encryption method will ensure the data privacy. 展开更多
关键词 Discrete grey wolf optimization data aggregation cloud computing IOT WSN smart healthcare elliptic curve elgamal energy optimization
下载PDF
A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm
18
作者 Mouna Bedoui Belgacem Bouallegue +4 位作者 Abdelmoty M.Ahmed Belgacem Hamdi Mohsen Machhout Mahmoud M.Khattab 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2177-2193,共17页
Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validat... Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validated against these two types of attacks,taking into account a well-defined attacker model.This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm(ECDSA)algorithm.The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks.More precisely,we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against attacks concerning only a few bits of secret may be sufficient to recover the private key.ECDSA can be implemented in different ways,in software or via dedicated hardware or a mix of both.Many different architectures are therefore possible to implement an ECDSA-based system.For this reason,this work focuses mainly on the hardware implementation of the digital signature ECDSA.In addition,the proposed ECDSA architecture with and without fault detection for the scalar multiplication have been implemented on Xilinxfield programmable gate arrays(FPGA)platform(Virtex-5).Our implementation results have been compared and discussed.Our area,frequency,area overhead and frequency degradation have been compared and it is shown that the proposed architecture of ECDSA with fault detection for the scalar multiplication allows a trade-off between the hardware overhead and the security of the ECDSA. 展开更多
关键词 Elliptic curve cryptography(ECC) Montgomery ladder fault detection method fault injection attack digital signature ECDSA FPGA
下载PDF
Secured ECG Signal Transmission Using Optimized EGC with Chaotic Neural Network in WBSN
19
作者 Ishani Mishra Sanjay Jain Vivek Maik 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1109-1123,共15页
In wireless body sensor network(WBSN),the set of electrocardiogram(ECG)data which is collected from sensor nodes and transmitted to the server remotely supports the experts to monitor the health of a patient.While tra... In wireless body sensor network(WBSN),the set of electrocardiogram(ECG)data which is collected from sensor nodes and transmitted to the server remotely supports the experts to monitor the health of a patient.While transmit-ting these collected data some adversaries may capture and misuse it due to the compromise of security.So,the major aim of this work is to enhance secure trans-mission of ECG signal in WBSN.To attain this goal,we present Pity Beetle Swarm Optimization Algorithm(PBOA)based Elliptic Galois Cryptography(EGC)with Chaotic Neural Network.To optimize the key generation process in Elliptic Curve Cryptography(ECC)over Galoisfield or EGC,private key is chosen optimally using PBOA algorithm.Then the encryption process is enhanced by presenting chaotic neural network which is used to generate chaotic sequences or cipher data.Results of this work show that the proposed cryptogra-phy algorithm attains better encryption time,decryption time,throughput and SNR than the conventional cryptography algorithms. 展开更多
关键词 Wireless body sensor network ECG pity beetle swarm optimization algorithm elliptic galois cryptography and chaotic neural network
下载PDF
A Posteriori Error Estimate of Two Grid Mixed Finite Element Methods for Semilinear Elliptic Equations
20
作者 Yiming Wen Luoping Chen Jiajia Dai 《Journal of Applied Mathematics and Physics》 2023年第2期361-376,共16页
In this paper, we present the a posteriori error estimate of two-grid mixed finite element methods by averaging techniques for semilinear elliptic equations. We first propose the two-grid algorithms to linearize the m... In this paper, we present the a posteriori error estimate of two-grid mixed finite element methods by averaging techniques for semilinear elliptic equations. We first propose the two-grid algorithms to linearize the mixed method equations. Then, the averaging technique is used to construct the a posteriori error estimates of the two-grid mixed finite element method and theoretical analysis are given for the error estimators. Finally, we give some numerical examples to verify the reliability and efficiency of the a posteriori error estimator. 展开更多
关键词 Two-Grid Mixed Finite Element Methods Posteriori Error Estimates Semilinear Elliptic Equations Averaging Technique
下载PDF
上一页 1 2 45 下一页 到第
使用帮助 返回顶部