Results 81 to 90 of about 180,085 (154)

Bootstrapping Optimization Techniques for the FINAL Fully Homomorphic Encryption Scheme

open access: yesInformation
With the advent of cloud computing and the era of big data, there is an increasing focus on privacy computing. Consequently, homomorphic encryption, being a primary technique for achieving privacy computing, is held in high regard.
Meng Wu, Xiufeng Zhao, Weitao Song
doaj   +1 more source

Mitigating Crossfire Attacks via Topology Spoofing Based on ENRNN-MTD

open access: yesApplied Sciences
Crossfire attacks disrupt network services by targeting critical links of server groups, causing traffic congestion and server failures that prevent legitimate users from accessing services.
Dexian Chang   +3 more
doaj   +1 more source

Reversible Data Hiding in Encrypted Images Based on Preprocessing-Free Variable Threshold Secret Sharing

open access: yesApplied Sciences
To solve the limitations of reversible data hiding in encrypted domains (RDH-ED) that cannot be applied to a distributed variable security environment, a novel RDH-ED scheme based on variable threshold image secret sharing (VTSIS) is proposed. Initially,
Chao Jiang   +3 more
doaj   +1 more source

Quantum Cryptography

open access: yesScientific American, 1992
Bennett, C, Brassard, G, Ekert, A
openaire   +2 more sources

FMC: Multimodal fake news detection based on multi-granularity feature fusion and contrastive learning

open access: yesAlexandria Engineering Journal
The automatic detection of multimodal fake news has recently garnered significant attention. However, the existing detection methods mainly focus on merging textual and visual features, but fail to make full use of multimodal numbers from the perspective
Facheng Yan   +4 more
doaj   +1 more source

Cryptographie

open access: yesCalenda, 2012
La cryptographie peut être définie comme l’art de la communication secrète. Il s’agit le plus souvent, mais pas exclusivement, d’une opération d’écriture, caractérisée par des procédés de dissimulation de nature diverse. Ces procédés sont déployés par le recours à de très nombreuses sources : des textes sacrés aux philosophies de la représentation, des
openaire   +1 more source

Text encryption through bio-inspired DNA and RNA sequencing. [PDF]

open access: yesPLoS One
Rashid OF, Abdulsahib SA, Al-Shahwani H.
europepmc   +1 more source

Home - About - Disclaimer - Privacy