Results 11 to 20 of about 11,196 (120)

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Dispersive Full-Channel Jones Matrix Modulation in Elliptical Polarization Bases via a Single-Layered Metasurface. [PDF]

open access: yesAdv Sci (Weinh)
This work presents a dispersive full‐channel Jones matrix modulation strategy using single‐layer metasurface. By synergizing wavelength dispersion engineering with elliptical polarization bases, independent control of four Jones matrix channels is achieved across multiple wavelengths.
He H   +10 more
europepmc   +2 more sources

Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]

open access: yes, 2009
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
Alvarez, Gonzalo   +3 more
core   +2 more sources

Sharing the Mask: TFHE Bootstrapping on Packed Messages

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Fully Homomorphic Encryption (FHE) schemes typically experience significant data expansion during encryption, leading to increased computational costs and memory demands during homomorphic evaluations compared to their plaintext counterparts.
Loris Bergerat   +5 more
doaj   +1 more source

Relating two standard notions of secrecy [PDF]

open access: yes, 2006
Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s should never be disclosed while equivalence-based secrecy states that two executions ...
B. Blanchet   +11 more
core   +12 more sources

A Single-Sized Metasurface for Image Steganography and Multi-Key Information Encryption

open access: yesEngineering
With the escalating flow of information and digital communication, information security has become an increasingly important issue. Traditional cryptographic methods are being threatened by advancing progress in computing, while physical encryption ...
Congling Liang   +4 more
doaj   +1 more source

Cryptanalysis of SIGABA [PDF]

open access: yes, 2007
SIGABA is a World War II cipher machine used by the United States. Both the United States Army and the United States Navy used it for tactical communication.
Chan, Wing
core   +4 more sources

Network Security Empowered Digital Teaching Data Protection Algorithm for Ceramic Technology

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
In this paper, a complete algorithm system covering sensitivity identification, feature fusion, encrypted transmission and cultural image protection is established based on the ceramic teaching scene enabled by network security. ABSTRACT The digitalization of ceramic technology teaching generates sensitive multi‐modal data, including personal ...
Yuting Zhu   +3 more
wiley   +1 more source

A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later [PDF]

open access: yes, 2018
The purpose of this paper is to describe and analyze the Cayley-Purser algorithm, which is a public-key cryptosystem proposed by Flannery in 1999. I will present two attacks on it, one of which is apparently new.
Stinson, Douglas R.
core   +1 more source

A Systematic Review on Functional Bioactive Compound Atractylone: Natural Source, Pharmacological Properties and Mechanisms Insights

open access: yesFood Science &Nutrition, Volume 14, Issue 2, February 2026.
Atractylone exhibits diverse pharmacological effects, including anticancer and neuroprotection. A systematic review was conducted following PRISMA guidelines to analyze Atractylone. This study explores Atractylone's sources, biosynthesis, and therapeutic potential.
Hamza Elhrech   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy