Results 211 to 220 of about 6,985 (236)

Optical image encryption based on interference under convergent random illumination

open access: closedJournal of Optics (United Kingdom), 2010
In an optical image encryption system based on the interference principle, two pure phase masks are designed analytically to hide an image. These two masks are illuminated with a plane wavefront to retrieve the original image in the form of an interference pattern at the decryption plane.
Joby Joseph, Kehar Singh
exaly   +3 more sources

Block Level Data-Deduplication and Security Using Convergent Encryption to Offer Proof of Verification

open access: closed2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), 2020
Cloud computing is a promising cutting-edge technology because of its cost-efficiency and flexibility to store and access the data. Preserving the data in cloud has become great challenge as the end users store their privacy data in daily life. But majority of the data in the cloud storage is redundant.
B. Tirapathi Reddy   +4 more
exaly   +3 more sources

Attribute-Based Convergent Encryption Key Management for Secure Deduplication in Cloud

open access: closedAdvances in Intelligent Systems and Computing, 2020
Data deduplication is a methodology for eliminating duplicate copies of data by keeping the single copy of data with proper access policies, instead of maintaining duplicates of the same data. It reduces cloud storage slot and communication bandwidth.
E. Silambarasan   +2 more
exaly   +3 more sources

Secure De-Duplication Over Wireless Sensing Data Using Convergent Encryption

open access: closed2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT), 2022
D. Yuvaraj   +5 more
exaly   +3 more sources

An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent Encryption algorithm

open access: closedMaterials Today: Proceedings, 2021
Abstract The cloud server stores its unique DE-duplicate data replication cloud storage system as outsourced only data copies. Deduplication cloud storage audits can verify the integrity of data stored in the cloud, while the cloud calculates the need to maintain only one copy of the copied file.
Vidhyanandhini Krishnasamy   +1 more
openalex   +2 more sources

Image Encryption Using Infinite Series Convergence

18th International Conference on Systems Engineering (ICSEng'05), 2006
Encryption of data is important for transmission of secured data to an authorized person. In the present work, image encryption is performed by an encipher algorithm based on the closed form of an infinite series. The pixel coordinates of the image are scrambled by the encipher algorithm which converts the image to a single dimensional matrix.
openaire   +1 more source

A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud Environment

Wireless Personal Communications, 2018
A super-connected society is emerging in which things and things or people and things communicate with each other through the Internet of Things. Since devices in the existing IoT environment have limitations such as low power, volume, and performance, a new paradigm has been suggested by integrating with cloud computing technology.
Byung Wook Jin   +2 more
openaire   +1 more source

Towards Converging Fully Homomorphic Batch Encryption with Data Integrity Assurance in Cloud Setting

2019
In encryption scheme setting, users who possess the right key can authorize to do computation with the data. In particular, cloud storage users lose their rights in terms of integrity on data, even after they ends up metered service from a CSP(Cloud Storage service provider), There is a possibility of dishonest computation over an old data by CSP also.
S. Hariharasitaraman, S. P. Balakannan
openaire   +1 more source

Review: Converging Encryption, Hashing and Steganography for Data Fortification

2023 6th International Conference on Advances in Science and Technology (ICAST), 2023
Devansh Vora   +3 more
openaire   +1 more source

Design and Implementation of a Document Encryption Convergence Program Selecting Encryption Methods, and Integrating the Program into the Existing Office System

Proceedings of the 12th International Conference on Data Science, Technology and Applications, 2023
Hong-Jin Ryu, Samuel Sangkon Lee
openaire   +1 more source

Home - About - Disclaimer - Privacy