Results 1 to 10 of about 93,492 (364)
Encryption–decryption-based state estimation for nonlinear complex networks subject to coupled perturbation [PDF]
This paper discusses the encryption-decryption-based state estimation (EDBSE) issue for coupled perturbation complex networks (CPCNs) in the framework of the Kalman-type filtering scheme.
Peixia Gao, Chaoqing Jia, Aozhan Zhou
semanticscholar +2 more sources
Decryption of historical manuscripts: the DECRYPT project [PDF]
Many historians and linguists are working individually and in an uncoordinated fashion on the identification and decryption of historical ciphers. This is a time-consuming process as they often work without access to automatic methods and processes that can accelerate the decipherment.
Megyesi, B. +9 more
openaire +3 more sources
A Novel Data Encryption Algorithm To Ensure Database Security
Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing
Sivan İbrahim +4 more
doaj +1 more source
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world.
Ghadah Aldabbagh +5 more
doaj +1 more source
Meta-optics empowered vector visual cryptography for high security and rapid decryption
Optical encryption is a promising approach to protecting secret information owing to the advantages of low-power consumption, parallel, high-speed, and multi-dimensional processing capabilities. Nevertheless, conventional strategies generally suffer from
Fei Zhang +9 more
semanticscholar +1 more source
A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi +5 more
doaj +1 more source
Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform [PDF]
In known security reductions for the Fujisaki-Okamoto transformation, decryption failures are handled via a reduction solving the rather unnatural task of finding failing plaintexts given the private key, resulting in a Grover search bound.
Kathrin Hövelmanns +2 more
semanticscholar +1 more source
Asymptotic Bound for RSA Variant with Three Decryption Exponents
This paper presents a cryptanalysis attack on the RSA variant with modulus $N=p^rq$ for $r\geq 2$ with three public and private exponents $(e_1,d_1),$ $(e_2,d_2),$ $(e_3,d_3)$ sharing the same modulus $N$ where $p$ and $q$ are consider to prime having ...
Amınu Alhajı Ibrahım +2 more
doaj +1 more source
DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things [PDF]
Internet of Medical Things (IoMT) can connect many medical imaging equipment to the medical information network to facilitate the process of diagnosing and treating doctors.
Yi Ding +6 more
semanticscholar +1 more source
Serial encryption using the functions of real variable
Context. Using the functions of a real variable in cryptosystems as keys allow increasing their cryptographic strength since it is more difficult to select such keys. Therefore, the development of such systems is relevant. Objective.
Viktor Avramenko, Volodymyr Demianenko
doaj +1 more source

