Results 181 to 190 of about 6,891 (225)
Drone forensics redefined: Integrating live, digital, and non-digital evidence acquisition systems. [PDF]
Lee D, Kang W.
europepmc +1 more source
Potential smart grid vulnerabilities to cyber attacks: Current threats and existing mitigation strategies. [PDF]
Paul B +13 more
europepmc +1 more source
Adaptive Localization-Free Secure Routing Protocol for Underwater Sensor Networks. [PDF]
Alharbi A, Ibrahim S.
europepmc +1 more source
Factors influencing intra-group data sharing in China's central state-owned enterprises: An information ecology perspective. [PDF]
Wang D, Ning X.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Randomized Convergent Encryption in the Standard Model via UCEs
2015 International Conference on Computer Science and Applications (CSA), 2015In this paper, we instantiate random oracle (RO) H in the Randomized Convergent Encryption proposed by Bellare et al. (Eurocrypt 2013) via a universal computation alextractor (UCE). We prove that if H is UCE secure for statistically unpredictable source, then there constructed RCE[H] is PRV$-CDA (Strong Privacy-Chosen Distribution Attacks) secure in ...
Hui-Ge Wang +3 more
openaire +1 more source
Enhanced Symmetric Convergent Encryption for Secured Data Deduplication in Cloud
Proceeding International Conference on Science and Engineering, 2023Cloud storage is a virtual setting that includes an amazing amount of processing power. The resources are in a state where they can serve users. Cloud data centres are the locations where all of this computing is maintained. In order to produce high-performance computing, the data centre houses a sizable number of powerful computers and servers ...
openaire +1 more source
Optical image encryption based on interference under convergent random illumination
Journal of Optics, 2010In an optical image encryption system based on the interference principle, two pure phase masks are designed analytically to hide an image. These two masks are illuminated with a plane wavefront to retrieve the original image in the form of an interference pattern at the decryption plane.
Pramod Kumar, Joby Joseph, Kehar Singh
openaire +1 more source

