171
Views
8
CrossRef citations to date
0
Altmetric
Articles

Reducing the Required Time and Power for Data Encryption and Decryption Using K-NN Machine Learning

, &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

Hossein Mohammadi, Abdulbaghi Ghaderzadeh & Amir Sheikhahmadi. (2023) A New Hybrid Method for Secure Data Transmission Using Watermarking based on Fuzzy Encryption in IoT. IETE Journal of Research 0:0, pages 1-22.
Read now

Articles from other publishers (7)

Amit Kumar Mishra, Neha Tripathi, Musheer Vaqur & Sugandha Sharma. (2023) Artificial Intelligence based Security Solution for Data Encryption using AES Algorithm. Artificial Intelligence based Security Solution for Data Encryption using AES Algorithm.
Hongjing Bi. (2021) Aggregation Encryption Method of Social Network Privacy Data Based on Matrix Decomposition Algorithm. Wireless Personal Communications 127:1, pages 369-383.
Crossref
Lin Tang. (2021) Integrity protection method for trusted data of IoT nodes based on transfer learning. Web Intelligence 19:3, pages 203-213.
Crossref
Meixi Chen. (2021) Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm. Complexity 2021, pages 1-12.
Crossref
Muthulakshmi B & Venkatesulu M. (2020) A novel security mechanism using AES cryptography approach in cloud computing. International Journal of Communication Systems 34:6.
Crossref
Alaa Ahmed Abbood, Qahtan Makki Shallal & Haider Khalaf Jabbar. 2021. Recent Trends in Signal and Image Processing. Recent Trends in Signal and Image Processing 135 144 .
Ethel A. Ramos & Davood Pour Yousefian Barfeh. (2019) Advanced Encryption Standard-Cipher Blockchain Mode for File Cryptography Stint Control. Advanced Encryption Standard-Cipher Blockchain Mode for File Cryptography Stint Control.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.