Results 31 to 40 of about 11,196 (120)

Security of signed ELGamal encryption [PDF]

open access: yes, 2005
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core  

Mobile Microgrids: Concepts, Key Technologies, Business Models, Applications and Prospects

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
Our study explores MMG concepts, key technologies, business models and applications, illustrating their impact on improving the flexible ADN operation. This study emphasises not only the practical importance of MMGs but also their pivotal role in reshaping the future landscape of energy delivery, offering valuable insights for researchers, policymakers
Tao Ding   +5 more
wiley   +1 more source

Impact of Cyberphysical Attacks on Load Tap Changers and Distribution System Voltage Stability

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
In this paper, we analysed the impact of a cyberphysical attack manipulating the operation of the LTC. In addition, we analysed the effect of load drop and PV while LTC is being manipulated. The cyber vulnerabilities leading to the attack were explored. ABSTRACT Load tap changers (LTCs) play a critical role in voltage regulation, and their manipulation
Anas AlMajali   +4 more
wiley   +1 more source

Barrel Shifter Physical Unclonable Function Based Encryption

open access: yes, 2017
Physical Unclonable Functions (PUFs) are circuits designed to extract physical randomness from the underlying circuit. This randomness depends on the manufacturing process.
Dee, Timothy   +2 more
core   +1 more source

A cell‐type‐specific regulon controlling monoterpene indole alkaloid biosynthesis with feedback and feedforward activation loops

open access: yesNew Phytologist, Volume 249, Issue 2, Page 945-960, January 2026.
Summary Monoterpene indole alkaloids (MIA) are a diverse class of plant natural products produced by a subset of lineages within the Asterid clade of eudicots. The diversity of MIAs provides a unique opportunity to study not only the evolution of biosynthetic genes but also their regulation.
Chenxin Li   +7 more
wiley   +1 more source

Safe and Quickest Medical Image Encryption Using Logistic Map Derived S‐Boxes and Galois Field

open access: yesComputational and Mathematical Methods, Volume 2026, Issue 1, 2026.
The pseudorandomness, simplicity of use, and extreme sensitivity to even the slightest change in the initial value and handling parameters make chaotic maps attractive. The use of medical imaging to diagnose illnesses has grown in significance. These photographs need strong security measures because they are exchanged over public networks.
Mahwish Bano   +5 more
wiley   +1 more source

Stealthy Plaintext [PDF]

open access: yes, 2012
Correspondence through email has become a very significant way of communication at workplaces. Information of most kinds such as text, video and audio can be shared through email, the most common being text.
Manjunath, Naidele Katrumane
core   +1 more source

A Hybrid Deep Learning Framework for Early Detection of Ovarian Cancer Using Ultrasound and MRI Images on a Secure Cloud Platform

open access: yesComplexity, Volume 2026, Issue 1, 2026.
Ovarian cancer continues to pose a major diagnostic challenge, as early‐stage disease often presents with subtle and heterogeneous imaging characteristics that limit the effectiveness of single‐modality analysis. In response to this challenge, this study proposes a novel hybrid deep learning framework for the early detection and classification of ...
Umesh Kumar Lilhore   +9 more
wiley   +1 more source

Variations of the McEliece Cryptosystem

open access: yes, 2017
Two variations of the McEliece cryptosystem are presented. The first one is based on a relaxation of the column permutation in the classical McEliece scrambling process.
Alain Couvreur   +16 more
core   +1 more source

Polynomial Representations of Weak Inverse Property Quasigroups and Their Role in Cryptographic Primitives

open access: yesJournal of Mathematics, Volume 2026, Issue 1, 2026.
A connection between cryptography and polynomial functions is extremely significant. Mathematical performance of polynomials helps to enhance the cryptographic primitives, which are trustworthy as well as straightforward representation tools, in everyday use. In this research, explicit topological sequences Qf which correspond to degree‐based, distance‐
Mohammad Mazyad Hazzazi   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy