Results 211 to 220 of about 6,985 (236)
Optical image encryption based on interference under convergent random illumination
In an optical image encryption system based on the interference principle, two pure phase masks are designed analytically to hide an image. These two masks are illuminated with a plane wavefront to retrieve the original image in the form of an interference pattern at the decryption plane.
Joby Joseph, Kehar Singh
exaly +3 more sources
Cloud computing is a promising cutting-edge technology because of its cost-efficiency and flexibility to store and access the data. Preserving the data in cloud has become great challenge as the end users store their privacy data in daily life. But majority of the data in the cloud storage is redundant.
B. Tirapathi Reddy +4 more
exaly +3 more sources
Attribute-Based Convergent Encryption Key Management for Secure Deduplication in Cloud
Data deduplication is a methodology for eliminating duplicate copies of data by keeping the single copy of data with proper access policies, instead of maintaining duplicates of the same data. It reduces cloud storage slot and communication bandwidth.
E. Silambarasan +2 more
exaly +3 more sources
Secure De-Duplication Over Wireless Sensing Data Using Convergent Encryption
D. Yuvaraj +5 more
exaly +3 more sources
Abstract The cloud server stores its unique DE-duplicate data replication cloud storage system as outsourced only data copies. Deduplication cloud storage audits can verify the integrity of data stored in the cloud, while the cloud calculates the need to maintain only one copy of the copied file.
Vidhyanandhini Krishnasamy +1 more
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Image Encryption Using Infinite Series Convergence
18th International Conference on Systems Engineering (ICSEng'05), 2006Encryption of data is important for transmission of secured data to an authorized person. In the present work, image encryption is performed by an encipher algorithm based on the closed form of an infinite series. The pixel coordinates of the image are scrambled by the encipher algorithm which converts the image to a single dimensional matrix.
openaire +1 more source
Wireless Personal Communications, 2018
A super-connected society is emerging in which things and things or people and things communicate with each other through the Internet of Things. Since devices in the existing IoT environment have limitations such as low power, volume, and performance, a new paradigm has been suggested by integrating with cloud computing technology.
Byung Wook Jin +2 more
openaire +1 more source
A super-connected society is emerging in which things and things or people and things communicate with each other through the Internet of Things. Since devices in the existing IoT environment have limitations such as low power, volume, and performance, a new paradigm has been suggested by integrating with cloud computing technology.
Byung Wook Jin +2 more
openaire +1 more source
Towards Converging Fully Homomorphic Batch Encryption with Data Integrity Assurance in Cloud Setting
2019In encryption scheme setting, users who possess the right key can authorize to do computation with the data. In particular, cloud storage users lose their rights in terms of integrity on data, even after they ends up metered service from a CSP(Cloud Storage service provider), There is a possibility of dishonest computation over an old data by CSP also.
S. Hariharasitaraman, S. P. Balakannan
openaire +1 more source
Review: Converging Encryption, Hashing and Steganography for Data Fortification
2023 6th International Conference on Advances in Science and Technology (ICAST), 2023Devansh Vora +3 more
openaire +1 more source
Proceedings of the 12th International Conference on Data Science, Technology and Applications, 2023
Hong-Jin Ryu, Samuel Sangkon Lee
openaire +1 more source
Hong-Jin Ryu, Samuel Sangkon Lee
openaire +1 more source

