Results 21 to 30 of about 58,616 (313)

Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users [PDF]

open access: yes, 2019
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system.
Millán Garcia-Varela, M. Sagrario   +2 more
core   +2 more sources

An RGB Image Cipher Using Chaotic Systems, 15-Puzzle Problem and DNA Computing

open access: yesIEEE Access, 2019
The application of confusion and diffusion processes on the three individual components of an RGB image is not secure and efficient, so this problem needs to be addressed.
Nadeem Iqbal   +5 more
doaj   +1 more source

Crypto Model of Real-Time Audio Streaming Across Paired Mobile Devices [PDF]

open access: yesEAI Endorsed Transactions on Mobile Communications and Applications, 2021
The progressive usage of the Internet of Things (IoT) and smartphone ubiquity is inducing attention, importance and interest in leveraging smartphones for deploying and running sophisticated mobile applications. Modern smartphones have good connectivity,
E. Ibam, O. Boyinbode, I. Ayelabowo
doaj   +1 more source

Improving the security of LSB image steganography

open access: yesJOIV: International Journal on Informatics Visualization, 2019
Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method.
Jamil Al-Azzeh   +3 more
doaj   +1 more source

Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]

open access: yes, 2016
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio   +46 more
core   +2 more sources

AES Algorithm: Encryption and Decryption [PDF]

open access: yesInternational Journal of Trend in Scientific Research and Development, 2018
Advanced Encryption Standard AES algorithm is one of the most common and widely used symmetric block cipher algorithm. This algorithm has its own particular structure to encrypt and decrypt sensitive data and is applied in hardware and software, all over the world.
Shivangi Wadehra   +2 more
openaire   +2 more sources

General Impossibility of Group Homomorphic Encryption in the Quantum World [PDF]

open access: yes, 2014
Group homomorphic encryption represents one of the most important building blocks in modern cryptography. It forms the basis of widely-used, more sophisticated primitives, such as CCA2-secure encryption or secure multiparty computation.
Armknecht, Frederik   +3 more
core   +10 more sources

Ad Hoc Multi-Input Functional Encryption [PDF]

open access: yes, 2019
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent possible) from the aggregator itself.
Agrawal, Shweta   +5 more
core   +2 more sources

Tissue factor: mechanisms of decryption [PDF]

open access: yesFrontiers in Bioscience, 2012
It is generally believed that only a small fraction of the tissue factor (TF) found on cell surfaces is active whereas the vast majority is cryptic in coagulation. It is unclear how cryptic TF differs from the coagulant active TF or potential mechanisms involved in transformation of cryptic TF to the coagulant active form.
Hema Kothari   +2 more
openaire   +3 more sources

Decrypting Aadhaar

open access: yes, 2021
The topic of Aadhaar links with the Indians in various ways. Aadhaar can be thought of as a digital infrastructure that has been an enabler and disabler in its ways. I exploresome of these ways through my article. I tried to question the proposition of introducing Aadhaar and carefully studied its theoretical bene?ts. Furthermore, I wish to explore the
openaire   +3 more sources

Home - About - Disclaimer - Privacy