Results 201 to 210 of about 8,789 (300)

Load Rebalancing for Distributed Hash Tables in Cloud Computing

open access: gold, 2015
Iosr Journals   +2 more
openalex   +1 more source

A Robust Reversible Watermarking Algorithm Resistant to Geometric Attacks Based on Tchebichef Moments

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
This paper presents a robust reversible watermarking algorithm based on Chebyshev moments, employing a two‐stage embedding mechanism. The proposed method leverages image block partitioning to embed the copyright watermark and the reversible watermark into non‐overlapping regions located inside and outside the inscribed circle of the image, respectively.
Wenjing Sun, Ling Zhang, Hongjun Zhang
wiley   +1 more source

Collaborative Attack Detection Using Distributed Hash Tables

open access: green, 2012
Paulo Esteves Verssimo   +4 more
openalex   +2 more sources

Hyperchaos‐Driven 3D RGB Image Scrambling and Encryption for Multi‐Image Security

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
The proposed encryption scheme scrambles N colour images by stacking them into a three‐dimensional red, green, blue image, generating a secure 256‐bit key using SHA‐256 and a user‐provided salt, and applying a five‐dimensional multi‐wing hyperchaotic system to produce random key streams.
Muhammad Hanif   +6 more
wiley   +1 more source

IBS-ECDHE: A blockchain-enhanced lightweight protocol for secure cloud-IoT in biomedical HCPS. [PDF]

open access: yesComput Struct Biotechnol J
Rehman AU   +6 more
europepmc   +1 more source

Blockchain‐Enabled Privacy‐Preserving Access Control for EHRs Sharing With Optimized User and Attribute Revocation

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk   +2 more
wiley   +1 more source

Revisiting the Security of the Lightweight Stream Cipher Draco: New Observation and TMDTO Attacks

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Draco is a lightweight small‐state stream cipher proposed in 2022. It is designed to provide a 128‐bit security level and be provably secure against time‐memory‐data trade‐off (TMDTO) attacks. In this paper, we revisit the security of Draco against TMDTO attacks.
Ziyu Guan   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy