Results 81 to 90 of about 180,085 (154)
Bootstrapping Optimization Techniques for the FINAL Fully Homomorphic Encryption Scheme
With the advent of cloud computing and the era of big data, there is an increasing focus on privacy computing. Consequently, homomorphic encryption, being a primary technique for achieving privacy computing, is held in high regard.
Meng Wu, Xiufeng Zhao, Weitao Song
doaj +1 more source
Mitigating Crossfire Attacks via Topology Spoofing Based on ENRNN-MTD
Crossfire attacks disrupt network services by targeting critical links of server groups, causing traffic congestion and server failures that prevent legitimate users from accessing services.
Dexian Chang +3 more
doaj +1 more source
To solve the limitations of reversible data hiding in encrypted domains (RDH-ED) that cannot be applied to a distributed variable security environment, a novel RDH-ED scheme based on variable threshold image secret sharing (VTSIS) is proposed. Initially,
Chao Jiang +3 more
doaj +1 more source
The automatic detection of multimodal fake news has recently garnered significant attention. However, the existing detection methods mainly focus on merging textual and visual features, but fail to make full use of multimodal numbers from the perspective
Facheng Yan +4 more
doaj +1 more source
La cryptographie peut être définie comme l’art de la communication secrète. Il s’agit le plus souvent, mais pas exclusivement, d’une opération d’écriture, caractérisée par des procédés de dissimulation de nature diverse. Ces procédés sont déployés par le recours à de très nombreuses sources : des textes sacrés aux philosophies de la représentation, des
openaire +1 more source
Text encryption through bio-inspired DNA and RNA sequencing. [PDF]
Rashid OF, Abdulsahib SA, Al-Shahwani H.
europepmc +1 more source
Empowering IoV Security: A Novel Secure Cryptographic Algorithm (OpCKEE) for Network Protection in Connected Vehicles. [PDF]
Ebadinezhad S, Nlend Bayemi PF.
europepmc +1 more source
Text cryptography and steganography based on RNA sequences generation, true random number generators, and codebook method. [PDF]
Hamad S, Rashid OF, Al-Dabbas HM.
europepmc +1 more source
A multi-image codebook approach for secure text transmission. [PDF]
Rashid OF, Tuama SA, Al-Shahwani H.
europepmc +1 more source

