Results 1 to 10 of about 1,976 (52)

A Proof Theoretic Analysis of Intruder Theories [PDF]

open access: yesLogical Methods in Computer Science, 2010
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages Gamma under the theory of blind signatures and arbitrary convergent equational theories modulo ...
Alwen F Tiu, Rajeev Gore, Jeremy Dawson
doaj   +1 more source

A Secured Data Processing Technique for Effective Utilization of Cloud Computing [PDF]

open access: yesJournal of Data Mining and Digital Humanities, 2018
Digital humanities require IT Infrastructure and sophisticated analytical tools, including datavisualization, data mining, statistics, text mining and information retrieval.
Mbarek Marwan   +2 more
doaj   +1 more source

A novel approach based on segmentation for securing medical image processing over cloud [PDF]

open access: yesJournal of Data Mining and Digital Humanities, 2018
Healthcare professionals require advanced image processing software to enhance the quality of clinical decisions. However, any investment in sophisticated local applications would dramatically increase healthcare costs.
Mbarek Marwan   +2 more
doaj   +1 more source

Continuous variable quantum cryptography using coherent states [PDF]

open access: yes, 2001
We propose several methods for quantum key distribution (QKD) based upon the generation and transmission of random distributions of coherent or squeezed states, and we show that they are are secure against individual eavesdropping attacks.
A. Einstein   +20 more
core   +5 more sources

Post-quantum cryptographic hardware primitives [PDF]

open access: yes, 2020
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi   +3 more
core  

Revealing the unseen: how to expose cloud usage while protecting user privacy [PDF]

open access: yes, 2017
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use.
Kellaris, Georgios, Turk, Ata, Varia, M.
core   +2 more sources

Post-Quantum Cryptography: S381 Cyclic Subgroup of High Order

open access: yes, 2017
Currently there is an active Post-Quantum Cryptography (PQC) solutions search, which attempts to find cryptographic protocols resistant to attacks by means of for instance Shor polynomial time algorithm for numerical field problems like integer ...
Hecht, Pedro
core   +1 more source

Cloning and Cryptography with Quantum Continuous Variables [PDF]

open access: yes, 2001
The cloning of quantum variables with continuous spectra is investigated. We define a Gaussian 1-to-2 cloning machine, which copies equally well two conjugate variables such as position and momentum or the two quadrature components of a light mode.
Cerf, N. J.   +2 more
core   +4 more sources

Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography [PDF]

open access: yes, 2018
This paper performs a thorough security analysis of a chaotic image encryption algorithm based on autoblocking and electrocardiography from the view point of modern cryptography.
Hao, Feng   +3 more
core   +2 more sources

Towards quantum-based privacy and voting

open access: yes, 2005
The privacy of communicating participants is often of paramount importance, but in some situations it is an essential condition. A typical example is a fair (secret) voting.
Chaum   +13 more
core   +1 more source

Home - About - Disclaimer - Privacy