Results 1 to 10 of about 119,938 (159)

Полиномиальные аппроксимации некоторых функций активации нейронных сетей

open access: yesИнформатика и автоматизация, 2022
Активное внедрение систем машинного обучения ставит актуальную задачу обеспечения их защиты от различных типов атак, направленных на нарушение свойств конфиденциальности, целостности и доступности как обрабатываемых данных, так и обучаемых моделей. Одним
Grigory Marshalko, Julia Trufanova
doaj   +1 more source

Cryptography And Network Security

open access: yesINTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Abstract -Cryptography and network security are foundational domains in the field of information technology and cybersecurity. As digital communication continues to expand, protecting data from unauthorized access, tampering, and interception is paramount.
Mrs. D. Anusha   +2 more
  +7 more sources

Swap and Rotate: Lightweight Linear Layers for SPN-based Blockciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In CHES 2017, Jean et al. presented a paper on “Bit-Sliding” in which the authors proposed lightweight constructions for SPN based block ciphers like AES, PRESENT and SKINNY.
Subhadeep Banik   +3 more
doaj   +1 more source

Lightweight and Privacy-Preserving Multi-Keyword Search over Outsourced Data

open access: yesApplied Sciences, 2023
In cloud computing, documents can be outsourced to the cloud server to achieve flexible access control and efficient sharing among multiple users. The outsourced documents can be intelligently searched according to some keywords with the help of cloud ...
Meng Zhao   +6 more
doaj   +1 more source

Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies

open access: yesInformation, 2015
With the rapid development of M2M wireless network, damages caused by malicious worms are getting more and more serious. The main goal of this paper is to explore the influences of removable devices on the interaction dynamics between malicious worms and
Jinhua Ma   +4 more
doaj   +1 more source

Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]

open access: yes, 2007
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo   +5 more
core   +2 more sources

A Higher-Level Security Scheme for Key Access on Cloud Computing

open access: yesIEEE Access, 2021
In this work, we construct a key access management scheme that seamlessly transitions any hierarchical-like access policy to the digital medium. The proposed scheme allows any public cloud system to be used as a private cloud.
Baris Celiktas   +2 more
doaj   +1 more source

Quantum Cryptography Approaching the Classical Limit [PDF]

open access: yes, 2010
We consider the security of continuous-variable quantum cryptography as we approach the classical-limit, i.e., when the unknown preparation noise at the sender's station becomes significantly noisy or thermal (even by as much as 10,000 times the variance
A. S. Holevo   +7 more
core   +2 more sources

Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]

open access: yes, 2017
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice   +2 more
core   +2 more sources

Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification

open access: yesSensors, 2019
Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols ...
Radim Ostadal   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy