Results 71 to 80 of about 180,085 (154)
A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing
In the current distributed environment, reversible data hiding in encrypted domain (RDH-ED) cannot grant corresponding privileges according to users’ identity classes.
Chao Jiang +4 more
doaj +1 more source
A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology
With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management.
Chaoyue Song +3 more
doaj +1 more source
Group theory in cryptography [PDF]
This paper is a guide for the pure mathematician who would like to know more about cryptography based on group theory. The paper gives a brief overview of the subject, and provides pointers to good textbooks, key research papers and recent survey papers ...
Blackburn, Simon R. +2 more
core
Survey of privacy-preserving data aggregation schemes in smart grid
With the rapid advancement of technology, smart grid are increasingly replacing traditional grids. Smart grid offer efficient data management and analysis tools that significantly benefit users, but they also introduce new privacy challenges.
Yiliang Han +5 more
doaj +1 more source
ACOFuzz: An ant colony algorithm-based fuzzer for smart contracts
In today's blockchain landscape, smart contracts are assuming a pivotal role, albeit accompanied by a heightened risk of exploitation by attackers. As smart contracts grow in complexity, vulnerabilities lurking within deeper layers of code become more ...
Peixuan Feng +5 more
doaj +1 more source
GAN-based pseudo random number generation optimized through genetic algorithms
Pseudo-random number generators (PRNGs) are deterministic algorithms that generate sequences of numbers approximating the properties of random numbers, which are widely utilized in various fields.
Xuguang Wu +4 more
doaj +1 more source
Research on Dual-Emotion Feature Fusion and Performance Improvement in Rumor Detection
At present, a large number of rumors are mixed in with various kinds of news, such as current affairs, politics, social economy, and military activities, which seriously reduces the credibility of Internet information and hinders the positive development
Wen Jiang +5 more
doaj +1 more source
A Secure Authentication Protocol Supporting Efficient Handover for UAV
Unmanned Aerial Vehicles (UAVs) are increasingly pivotal in operations such as flood rescue, wildfire surveillance, and covert military endeavors, with their integration into the Internet of Things (IoT) networks broadening the scope of services they ...
Kang Wen +5 more
doaj +1 more source
Motion vector‐domain video steganalysis exploiting skipped macroblocks
Video steganography has the potential to be used to convey illegal information, and video steganalysis is a vital tool to detect the presence of this illicit act.
Jun Li +4 more
doaj +1 more source
Sota Voce: Low-Noise Sampling of Sparse Fixed-Weight Vectors
Many post-quantum cryptosystems require generating an n-bit binary vector with a prescribed Hamming weight ω, a process known as fixed-weight sampling.
Décio Luiz Gazzoni Filho +5 more
doaj +1 more source

