Results 11 to 20 of about 1,483 (186)

The most efficient indifferentiable hashing to elliptic curves of j-invariant 1728

open access: yesJournal of Mathematical Cryptology, 2022
This article makes an important contribution to solving the long-standing problem of whether all elliptic curves can be equipped with a hash function (indifferentiable from a random oracle) whose running time amounts to one exponentiation in the basic ...
Koshelev Dmitrii
doaj   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack

open access: yesApplied Sciences, 2019
The 51% attack is a technique which intends to fork a blockchain in order to conduct double-spending. Adversaries controlling more than half of the total hashing power of a network can perform this attack.
Sarwar Sayeed, Hector Marco-Gisbert
doaj   +1 more source

Balancing Accuracy and Privacy in Federated Queries of Clinical Data Repositories: Algorithm Development and Validation

open access: yesJournal of Medical Internet Research, 2020
BackgroundOver the past decade, the emergence of several large federated clinical data networks has enabled researchers to access data on millions of patients at dozens of health care organizations.
Yu, Yun William, Weber, Griffin M
doaj   +1 more source

Palm-Print Pattern Matching Based on Features Using Rabin-Karp for Person Identification

open access: yesThe Scientific World Journal, 2015
Palm-print based individual identification is regarded as an effectual method for identifying persons with high confidence. Palm-print with larger inner surface of hand contains many features such as principle lines, ridges, minutiae points, singular ...
S. Kanchana, G. Balakrishnan
doaj   +1 more source

Three‐Segment Protein Labeling Using a Highly Efficient and Cysteine‐Less Split Intein Identified with Computational Prediction of Aggregation Properties

open access: yesAngewandte Chemie, EarlyView.
Tandem protein trans‐splicing (PTS) assembles a protein from three segments. Expanding this technology to individually treat cysteines in each segment, for example, for chemical labeling using thiol bioconjugation, the authors identify a second, highly efficient cysteine‐less split intein.
Christoph Humberg   +3 more
wiley   +2 more sources

A Novel Lightweight Approach for Video Retrieval on Mobile Augmented Reality Environment

open access: yesApplied Sciences, 2018
Mobile Augmented Reality merges the virtual objects with real world on mobile devices, while video retrieval brings out the similar looking videos from the large-scale video dataset.
Joolekha Bibi Joolee   +4 more
doaj   +1 more source

Permutation-Based Hashing Beyond the Birthday Bound

open access: yesIACR Transactions on Symmetric Cryptology
It is known that the sponge construction is tightly indifferentiable from a random oracle up to around 2c/2 queries, where c is the capacity. In particular, it cannot provide generic security better than half of the underlying permutation size.
Charlotte Lefevre, Bart Mennink
doaj   +1 more source

Research Ready Data Lakes: Protecting Privacy in Relatable Datasets

open access: yesInternational Journal of Population Data Science, 2019
Background with rationale The Georgia Policy Labs’ mission is to improve outcomes for children and families by producing rigorous research with long-term government partners.
Robert McMillan, Maggie Reeves
doaj   +1 more source

Time Efficient Hash Key Generation for Blockchain Enabled Framework

open access: yesIEEE Access
Blockchain, in general, helps organizations to improve the transparency and governance by removing its shortfalls and building better control overall. Blockchain network, public or private, is a competent technology when used in order with an optimized ...
Shyam Kumar Sinha, Debarka Mukhopadhyay
doaj   +1 more source

Home - About - Disclaimer - Privacy