Results 1 to 10 of about 1,976 (52)
A Proof Theoretic Analysis of Intruder Theories [PDF]
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages Gamma under the theory of blind signatures and arbitrary convergent equational theories modulo ...
Alwen F Tiu, Rajeev Gore, Jeremy Dawson
doaj +1 more source
A Secured Data Processing Technique for Effective Utilization of Cloud Computing [PDF]
Digital humanities require IT Infrastructure and sophisticated analytical tools, including datavisualization, data mining, statistics, text mining and information retrieval.
Mbarek Marwan +2 more
doaj +1 more source
A novel approach based on segmentation for securing medical image processing over cloud [PDF]
Healthcare professionals require advanced image processing software to enhance the quality of clinical decisions. However, any investment in sophisticated local applications would dramatically increase healthcare costs.
Mbarek Marwan +2 more
doaj +1 more source
Continuous variable quantum cryptography using coherent states [PDF]
We propose several methods for quantum key distribution (QKD) based upon the generation and transmission of random distributions of coherent or squeezed states, and we show that they are are secure against individual eavesdropping attacks.
A. Einstein +20 more
core +5 more sources
Post-quantum cryptographic hardware primitives [PDF]
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi +3 more
core
Revealing the unseen: how to expose cloud usage while protecting user privacy [PDF]
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use.
Kellaris, Georgios, Turk, Ata, Varia, M.
core +2 more sources
Post-Quantum Cryptography: S381 Cyclic Subgroup of High Order
Currently there is an active Post-Quantum Cryptography (PQC) solutions search, which attempts to find cryptographic protocols resistant to attacks by means of for instance Shor polynomial time algorithm for numerical field problems like integer ...
Hecht, Pedro
core +1 more source
Cloning and Cryptography with Quantum Continuous Variables [PDF]
The cloning of quantum variables with continuous spectra is investigated. We define a Gaussian 1-to-2 cloning machine, which copies equally well two conjugate variables such as position and momentum or the two quadrature components of a light mode.
Cerf, N. J. +2 more
core +4 more sources
Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography [PDF]
This paper performs a thorough security analysis of a chaotic image encryption algorithm based on autoblocking and electrocardiography from the view point of modern cryptography.
Hao, Feng +3 more
core +2 more sources
Towards quantum-based privacy and voting
The privacy of communicating participants is often of paramount importance, but in some situations it is an essential condition. A typical example is a fair (secret) voting.
Chaum +13 more
core +1 more source

