Полиномиальные аппроксимации некоторых функций активации нейронных сетей
Активное внедрение систем машинного обучения ставит актуальную задачу обеспечения их защиты от различных типов атак, направленных на нарушение свойств конфиденциальности, целостности и доступности как обрабатываемых данных, так и обучаемых моделей. Одним
Grigory Marshalko, Julia Trufanova
doaj +1 more source
Cryptography And Network Security
Abstract -Cryptography and network security are foundational domains in the field of information technology and cybersecurity. As digital communication continues to expand, protecting data from unauthorized access, tampering, and interception is paramount.
Mrs. D. Anusha +2 more
+7 more sources
Swap and Rotate: Lightweight Linear Layers for SPN-based Blockciphers
In CHES 2017, Jean et al. presented a paper on “Bit-Sliding” in which the authors proposed lightweight constructions for SPN based block ciphers like AES, PRESENT and SKINNY.
Subhadeep Banik +3 more
doaj +1 more source
Lightweight and Privacy-Preserving Multi-Keyword Search over Outsourced Data
In cloud computing, documents can be outsourced to the cloud server to achieve flexible access control and efficient sharing among multiple users. The outsourced documents can be intelligently searched according to some keywords with the help of cloud ...
Meng Zhao +6 more
doaj +1 more source
Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies
With the rapid development of M2M wireless network, damages caused by malicious worms are getting more and more serious. The main goal of this paper is to explore the influences of removable devices on the interaction dynamics between malicious worms and
Jinhua Ma +4 more
doaj +1 more source
Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo +5 more
core +2 more sources
A Higher-Level Security Scheme for Key Access on Cloud Computing
In this work, we construct a key access management scheme that seamlessly transitions any hierarchical-like access policy to the digital medium. The proposed scheme allows any public cloud system to be used as a private cloud.
Baris Celiktas +2 more
doaj +1 more source
Quantum Cryptography Approaching the Classical Limit [PDF]
We consider the security of continuous-variable quantum cryptography as we approach the classical-limit, i.e., when the unknown preparation noise at the sender's station becomes significantly noisy or thermal (even by as much as 10,000 times the variance
A. S. Holevo +7 more
core +2 more sources
Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice +2 more
core +2 more sources
Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification
Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols ...
Radim Ostadal +3 more
doaj +1 more source

