Results 31 to 40 of about 1,838 (257)
Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud
Cloud and remote storage, which has become the preferred method for reducing the security risk and safeguarding our data, is widely used for backups or outsourcing.
Jianyi Zhang +4 more
doaj +1 more source
A novel deterministic substitution box generator over elliptic curves for real-time applications
Recently, highly dynamic substitution box (S-box) generators are widely used in cryptosystems to improve the security against modern computational attacks.
Mohammad Abdul Mujeeb Khan +3 more
doaj +1 more source
Key-customizable encrypted deduplication with access control for cloud storage
With the rapid development and application of the Internet, traditional storage resources have been found unable to meet the growing demand for massive data storage.
GU Bolun +3 more
doaj +3 more sources
Fair Data Transactions Across Private Databases
In this era of big data, data transactions are becoming more frequent and bringing new benefits for both data buyers and providers. However, there are no data transaction schemes to satisfy the special security and business requirements of data ...
Wei Yuan
doaj +1 more source
An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases
Recently, database users have begun to use cloud database services to outsource their databases. The reason for this is the high computation speed and the huge storage capacity that cloud owners provide at low prices.
Sultan Almakdi +3 more
doaj +1 more source
Subverting Telegram’s End-to-End Encryption
Telegram is a popular secure messaging service with third biggest user base as of 2021. In this paper, we analyze the security of Telegram’s end-to-end encryption (E2EE) protocol in presence of mass-surveillance.
Benoît Cogliati +2 more
doaj +1 more source
Design of a BIST implemented AES crypto-processor ASIC.
This paper presents the design of a Built-in-self-Test (BIST) implemented Advanced Encryption Standard (AES) cryptoprocessor Application Specific Integrated Circuit (ASIC).
Md Liakot Ali +2 more
doaj +2 more sources
Signcryption schemes with insider security in an ideal permutation model
Signcryption aims to provide both confidentiality and authentication of messages more efficiently than performing encryption and signing independently. The “Commit-then-Sign & Encrypt” (CtS&E) method allows to perform encryption and signing in parallel ...
Bansal Tarun Kumar +2 more
doaj +1 more source
This paper proposes two projector‐based Hopfield neural network (HNN) estimators for online, constrained parameter estimation under time‐varying data, additive disturbances, and slowly drifting physical parameters. The first is a constraint‐aware HNN that enforces linear equalities and inequalities (via slack neurons) and continuously tracks the ...
Miguel Pedro Silva
wiley +1 more source
Digital Key Distribution Protected by Recorded Quantum Noise
A new digital key distribution and encryption system for broad use is presented. It offers affordable perfect security for in-transit digital communications and is quantum-resistant.
Geraldo A. A
doaj +1 more source

