Results 31 to 40 of about 1,838 (257)

Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud

open access: yesIEEE Access, 2018
Cloud and remote storage, which has become the preferred method for reducing the security risk and safeguarding our data, is widely used for backups or outsourcing.
Jianyi Zhang   +4 more
doaj   +1 more source

A novel deterministic substitution box generator over elliptic curves for real-time applications

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Recently, highly dynamic substitution box (S-box) generators are widely used in cryptosystems to improve the security against modern computational attacks.
Mohammad Abdul Mujeeb Khan   +3 more
doaj   +1 more source

Key-customizable encrypted deduplication with access control for cloud storage

open access: yes网络与信息安全学报
With the rapid development and application of the Internet, traditional storage resources have been found unable to meet the growing demand for massive data storage.
GU Bolun   +3 more
doaj   +3 more sources

Fair Data Transactions Across Private Databases

open access: yesIEEE Access, 2020
In this era of big data, data transactions are becoming more frequent and bringing new benefits for both data buyers and providers. However, there are no data transaction schemes to satisfy the special security and business requirements of data ...
Wei Yuan
doaj   +1 more source

An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases

open access: yesIEEE Access, 2021
Recently, database users have begun to use cloud database services to outsource their databases. The reason for this is the high computation speed and the huge storage capacity that cloud owners provide at low prices.
Sultan Almakdi   +3 more
doaj   +1 more source

Subverting Telegram’s End-to-End Encryption

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Telegram is a popular secure messaging service with third biggest user base as of 2021. In this paper, we analyze the security of Telegram’s end-to-end encryption (E2EE) protocol in presence of mass-surveillance.
Benoît Cogliati   +2 more
doaj   +1 more source

Design of a BIST implemented AES crypto-processor ASIC.

open access: yesPLoS ONE, 2021
This paper presents the design of a Built-in-self-Test (BIST) implemented Advanced Encryption Standard (AES) cryptoprocessor Application Specific Integrated Circuit (ASIC).
Md Liakot Ali   +2 more
doaj   +2 more sources

Signcryption schemes with insider security in an ideal permutation model

open access: yesJournal of Mathematical Cryptology, 2019
Signcryption aims to provide both confidentiality and authentication of messages more efficiently than performing encryption and signing independently. The “Commit-then-Sign & Encrypt” (CtS&E) method allows to perform encryption and signing in parallel ...
Bansal Tarun Kumar   +2 more
doaj   +1 more source

Hopfield Neural Networks for Online Constrained Parameter Estimation With Time‐Varying Dynamics and Disturbances

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
This paper proposes two projector‐based Hopfield neural network (HNN) estimators for online, constrained parameter estimation under time‐varying data, additive disturbances, and slowly drifting physical parameters. The first is a constraint‐aware HNN that enforces linear equalities and inequalities (via slack neurons) and continuously tracks the ...
Miguel Pedro Silva
wiley   +1 more source

Digital Key Distribution Protected by Recorded Quantum Noise

open access: yesIEEE Access
A new digital key distribution and encryption system for broad use is presented. It offers affordable perfect security for in-transit digital communications and is quantum-resistant.
Geraldo A. A
doaj   +1 more source

Home - About - Disclaimer - Privacy