Results 71 to 80 of about 8,381 (240)
Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher
In the present era of digital communication, secure data transfer is a challenging task in the case of open networks. Low-key-strength encryption techniques incur enormous security threats.
Parveiz Nazir Lone +5 more
doaj +1 more source
Abstract Variations in Earth's orbit and axial tilt induce climatic changes which are recorded in sedimentary deposits. The frequencies of these cyclical variations are integer combinations of the main secular frequencies of the solar system. Analyzing these cycles in sedimentary records can help establish an astronomical time scale for the geological ...
N. Hoang +7 more
wiley +1 more source
iTrust—A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography
Recently, many platforms have outsourced tasks to numerous smartphone devices known as Mobile Crowd-sourcing System (MCS). The data is collected and transferred to the platform for further analysis and processing.
Hisham Almajed +2 more
doaj +1 more source
KRIPTOGRAFI VISUAL PADA GAMBAR BERWARNA (RGB) MENGGUNAKAN ALGORITMA ELLIPTIC CURVE CRYPTOGRAPHY [PDF]
ABSTRAK Kriptografi berperan penting pada era digital dalam mengamankan data dari peretas. Seiring berkembangnya teknologi, data yang dapat diamankan menggunakan kriptografi semakin luas, salah satunya adalah mengamankan gambar menggunakan kriptografi ...
Della Annisa Zahra, -
core
Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat +3 more
wiley +1 more source
Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips
Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID.
Zilong Liu +4 more
doaj +1 more source
ECC programming in Java Card [PDF]
9 páginas, 3 figuras, 3 listingElliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of el- liptic curves.
Gayoso Martínez, Víctor +1 more
core +1 more source
Nanoscale Curvature Regulates YAP/TAZ Nuclear Localization Through Nuclear Deformation and Rupture
This study uses experiments and biophysical modeling to examine the response and adaptation of cells to nanoscale topography of surfaces. It is shown that cytoskeletal assembly and nuclear localization of transcription regulatory factors such as yes‐associated protein (YAP) and transcriptional coactivator with PDZ‐binding motif (TAZ) can be tuned by ...
Emmet A. Francis +7 more
wiley +1 more source
Next-generation ECC processor on FPGA: Leveraging Koblitz curves for enhanced performance
This paper presents a hardware design of an Elliptic Curve Cryptography (ECC) processor optimized for Field Programmable Gate Arrays (FPGAs), focusing on the Koblitz curve Secp256k1.
Tung Nguyen +4 more
doaj +1 more source
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed +3 more
core +6 more sources

