Results 201 to 210 of about 6,985 (236)
Drone forensics redefined: Integrating live, digital, and non-digital evidence acquisition systems. [PDF]
Lee D, Kang W.
europepmc +1 more source
Assessment of Negative Symptoms in Schizophrenia: From the Consensus Conference-Derived Scales to Remote Digital Phenotyping. [PDF]
Mucci A +6 more
europepmc +1 more source
Sexual and reproductive empowerment scale for adolescents and young adults: a psychometric analysis among Chinese college students. [PDF]
Hou R +5 more
europepmc +1 more source
Randomized Convergent Encryption in the Standard Model via UCEs
In this paper, we instantiate random oracle (RO) H in the Randomized Convergent Encryption proposed by Bellare et al. (Eurocrypt 2013) via a universal computation alextractor (UCE). We prove that if H is UCE secure for statistically unpredictable source, then there constructed RCE[H] is PRV$-CDA (Strong Privacy-Chosen Distribution Attacks) secure in ...
Huige Wang +3 more
exaly +3 more sources
Holographic encryption system in the Fresnel domain with convergent random illumination
A secure holographic system is proposed, based on the principle of two-wave encryption in the Fresnel domain under convergent random illumination. The convergent random wavefront, instead of the commonly used plane wavefront, improves the security of a holographic encryption system, providing better protection from unauthorized users.
Joby Joseph, Kehar Singh
exaly +3 more sources
Conventional encryption schemes are being used over the years for securing outsourced data to cloud. However, this impedes deduplication- the ability to identify and remove duplicate data from storage server. The idea of Convergent Encryption was introduced to overcome this problem which ensures that identical plaintext files will always produce ...
Dakshnamoorthy Manivannan
exaly +3 more sources
Convergent encryption enabled secure data deduplication algorithm for cloud environment
SummaryThe exponential growth of data poses a critical challenge for cloud storage systems. Redundant data consumes valuable storage space and increases infrastructure costs. Data deduplication, a technique for eliminating duplicate data copies, offers a promising solution.
Shahnawaz Ahmad
exaly +3 more sources
DICE: A dual integrity convergent encryption protocol for client side secure data deduplication
Message Locked Encryption (MLE) provides a way to achieve deduplication of data over the cloud in a secured and efficient manner. Various cryptographic protocols that are variants of the MLE scheme have been introduced, but they are either vulnerable to poison attack or consume a large amount of bandwidth.
Dr. Priyanka Singh, Pradeep K Atrey
exaly +4 more sources

