Results 11 to 20 of about 11,196 (120)
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Dispersive Full-Channel Jones Matrix Modulation in Elliptical Polarization Bases via a Single-Layered Metasurface. [PDF]
This work presents a dispersive full‐channel Jones matrix modulation strategy using single‐layer metasurface. By synergizing wavelength dispersion engineering with elliptical polarization bases, independent control of four Jones matrix channels is achieved across multiple wavelengths.
He H +10 more
europepmc +2 more sources
Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
Alvarez, Gonzalo +3 more
core +2 more sources
Sharing the Mask: TFHE Bootstrapping on Packed Messages
Fully Homomorphic Encryption (FHE) schemes typically experience significant data expansion during encryption, leading to increased computational costs and memory demands during homomorphic evaluations compared to their plaintext counterparts.
Loris Bergerat +5 more
doaj +1 more source
Relating two standard notions of secrecy [PDF]
Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s should never be disclosed while equivalence-based secrecy states that two executions ...
B. Blanchet +11 more
core +12 more sources
A Single-Sized Metasurface for Image Steganography and Multi-Key Information Encryption
With the escalating flow of information and digital communication, information security has become an increasingly important issue. Traditional cryptographic methods are being threatened by advancing progress in computing, while physical encryption ...
Congling Liang +4 more
doaj +1 more source
SIGABA is a World War II cipher machine used by the United States. Both the United States Army and the United States Navy used it for tactical communication.
Chan, Wing
core +4 more sources
Network Security Empowered Digital Teaching Data Protection Algorithm for Ceramic Technology
In this paper, a complete algorithm system covering sensitivity identification, feature fusion, encrypted transmission and cultural image protection is established based on the ceramic teaching scene enabled by network security. ABSTRACT The digitalization of ceramic technology teaching generates sensitive multi‐modal data, including personal ...
Yuting Zhu +3 more
wiley +1 more source
A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later [PDF]
The purpose of this paper is to describe and analyze the Cayley-Purser algorithm, which is a public-key cryptosystem proposed by Flannery in 1999. I will present two attacks on it, one of which is apparently new.
Stinson, Douglas R.
core +1 more source
Atractylone exhibits diverse pharmacological effects, including anticancer and neuroprotection. A systematic review was conducted following PRISMA guidelines to analyze Atractylone. This study explores Atractylone's sources, biosynthesis, and therapeutic potential.
Hamza Elhrech +8 more
wiley +1 more source

