Results 11 to 20 of about 11,160 (119)

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Dispersive Full-Channel Jones Matrix Modulation in Elliptical Polarization Bases via a Single-Layered Metasurface. [PDF]

open access: yesAdv Sci (Weinh)
This work presents a dispersive full‐channel Jones matrix modulation strategy using single‐layer metasurface. By synergizing wavelength dispersion engineering with elliptical polarization bases, independent control of four Jones matrix channels is achieved across multiple wavelengths.
He H   +10 more
europepmc   +2 more sources

Cryptanalysis of an Encryption Scheme Based on Blind Source Separation [PDF]

open access: yes, 2006
Recently Lin et al. proposed a method of using the underdetermined BSS (blind source separation) problem to realize image and speech encryption. In this paper, we give a cryptanalysis of this BSS-based encryption and point out that it is not secure ...
Chen, Guanrong   +3 more
core   +2 more sources

Sharing the Mask: TFHE Bootstrapping on Packed Messages

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Fully Homomorphic Encryption (FHE) schemes typically experience significant data expansion during encryption, leading to increased computational costs and memory demands during homomorphic evaluations compared to their plaintext counterparts.
Loris Bergerat   +5 more
doaj   +1 more source

A Single-Sized Metasurface for Image Steganography and Multi-Key Information Encryption

open access: yesEngineering
With the escalating flow of information and digital communication, information security has become an increasingly important issue. Traditional cryptographic methods are being threatened by advancing progress in computing, while physical encryption ...
Congling Liang   +4 more
doaj   +1 more source

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yes, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +3 more sources

Network Security Empowered Digital Teaching Data Protection Algorithm for Ceramic Technology

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
In this paper, a complete algorithm system covering sensitivity identification, feature fusion, encrypted transmission and cultural image protection is established based on the ceramic teaching scene enabled by network security. ABSTRACT The digitalization of ceramic technology teaching generates sensitive multi‐modal data, including personal ...
Yuting Zhu   +3 more
wiley   +1 more source

Cryptanalysis of a chaotic block cipher with external key and its improved version [PDF]

open access: yes, 2006
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: 1) a number of weak keys exists; 2) some important ...
Alvarez   +12 more
core   +2 more sources

A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later [PDF]

open access: yes, 2018
The purpose of this paper is to describe and analyze the Cayley-Purser algorithm, which is a public-key cryptosystem proposed by Flannery in 1999. I will present two attacks on it, one of which is apparently new.
Stinson, Douglas R.
core   +1 more source

Naturally Rehearsing Passwords [PDF]

open access: yes, 2013
We introduce quantitative usability and security models to guide the design of password management schemes --- systematic strategies to help users create and remember multiple passwords.
A. Acquisti   +18 more
core   +1 more source

Home - About - Disclaimer - Privacy