Results 101 to 110 of about 59,589 (271)

LightAuth: A Lightweight Sensor Nodes Authentication Framework for Smart Health System

open access: yesExpert Systems, Volume 42, Issue 2, February 2025.
ABSTRACT Counterfeit medical devices pose a threat to patient safety, necessitating a secure device authentication system for medical applications. Resource‐constrained sensory nodes are vulnerable to hacking, prompting the need for robust security measures.
Zain Ul Islam Adil   +5 more
wiley   +1 more source

Features of Structural Hardware Transformation of Information in Cryptosystems

open access: yesDoklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki
The article considers types, functions and some features of cryptosystems, as well as circuit design options for expanding their functionality. Options for generating keys and ciphers used in cryptosystems with a typical structural organization, and ...
A. F. Chernyavskiy   +2 more
doaj   +1 more source

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps

open access: yesEntropy, 2018
This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process.
Congxu Zhu, Guojun Wang, Kehui Sun
doaj   +1 more source

A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
A novel image encryption algorithm has been developed to impart security to the digital color images. ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit.
Muhammad Aqeel   +6 more
wiley   +1 more source

Security analysis and enhancements of an image cryptosystem based on hyperchaotic system

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
The security system engaged to transfer securely the sensitive information over wireless channels must posses some innate features such as high resistivity to various cryptographic attacks, high sensitivity to secret key and plaintext, and strong ...
Musheer Ahmad   +2 more
doaj  

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]

open access: yes, 2017
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M.   +4 more
core   +1 more source

Blockchain‐Enabled Car Sharing: Enhancing Reliability and Vehicle History Management

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
The paper addresses the growing demand for cost‐effective transportation solutions amidst rising car ownership expenses by proposing a decentralized car‐sharing and renting platform called Crowd CarLink, leveraging blockchain technology. This platform enables secure recording of vehicle maintenance and lease history while overcoming challenges of ...
Chen Ben Tolila   +3 more
wiley   +1 more source

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

NTRU-type fully homomorphic encryption scheme without key switching

open access: yes网络与信息安全学报, 2017
In order to construct a fully homomorphic encryption scheme based on NTRU cryptosystem from ring learning with errors, noise growth and homomorphic property in the NTRU cryptosystem were analyzed. The con-cept of zero homomorphic encryption was introdced
Xin-xia SONG   +2 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy