Results 81 to 90 of about 8,381 (240)

Blockweave: An Arweave‐Based Decentralized Storage Solution to Tackle the Blockchain Trilemma

open access: yesEngineering Reports, Volume 7, Issue 7, July 2025.
Leveraging Arweave's blockweave and Proof‐of‐Access consensus, this framework reduces on‐chain metadata to 48 bytes, enabling throughput up to 7200 TPS, 99%$$ 99\% $$ storage savings, and robust security (Q(0.4)=0.82)$$ \left(\mathrm{Q}(0.4)=0.82\right) $$ while achieving Tier‐S decentralization on $300 mining nodes.
Saha Reno, Koushik Roy, Tamanna Tabassum
wiley   +1 more source

A Subexponential Algorithm for Evaluating Large Degree Isogenies

open access: yes, 2010
An isogeny between elliptic curves is an algebraic morphism which is a group homomorphism. Many applications in cryptography require evaluating large degree isogenies between elliptic curves efficiently. For ordinary curves of the same endomorphism ring,
Jao, David, Soukharev, Vladimir
core   +1 more source

Towards Sustainable IoT: A Digital Signature‐Enhanced Federated Learning Approach

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 4, July/August 2025.
ABSTRACT Federated Learning (FL) is emerging as a premier paradigm for privacy‐preserved Machine Learning (ML), enabling devices to train models without central data pooling collaboratively. In the contemporary Internet of Things (IoT) landscape, characterized by escalating energy consumption and associated carbon footprint, FL is recognized not merely
Shahida Hafeezan Qureshi   +5 more
wiley   +1 more source

IMAGE ENCRYPTION USING ELLIPTIC CURVE CRYPTOGRAPHY [PDF]

open access: yes, 2015
This paper deals with encryption of image using Elliptic curve cryptography (ECC).Elliptic curve cryptography (ECC) is an approach to public key cryptography based on algebraic structure of elliptic curves over finite fields. Basic ElGamal elliptic curve
Shukla, Ashutosh
core   +1 more source

Security of Portable Document Format (PDF) Using Elliptic Curve Cryptography (ECC) Algorithm

open access: yesJ-Icon : Jurnal Komputer dan Informatika, 2022
Penggunaan dokumen digital telah banyak digunakan pada berbagai kalangan, organisasi ataupun instansi.  Salah satu dokumen digital yang sering digunakan adalah portable document format (PDF). Diperlukan sebuah algoritma yang diterapkan dalam perangkat lunak, sehingga dapat mengamankan dokumen tersebut dari pihak-pihak yang dapat merugikan.
Taopan, Gever Imanuel   +2 more
openaire   +1 more source

Analytical Study of Hybrid Techniques for Image Encryption and Decryption

open access: yesSensors, 2020
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
Chiranji Lal Chowdhary   +5 more
doaj   +1 more source

Can NSEC5 be practical for DNSSEC deployments? [PDF]

open access: yes, 2017
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon   +6 more
core  

Caregiver response types and children language outcomes in preschoolers with and without hearing loss in Aotearoa New Zealand

open access: yesJournal of the Royal Society of New Zealand, Volume 55, Issue 3, Page 574-595, June 2025.
ABSTRACT Recent advances in audiological early intervention and hearing technologies have significantly improved access to spoken language for children with hearing loss (CwHL), but many CwHL require additional support to match the language development of their peers with normal hearing (PwNH).
Nuzhat Sultana   +2 more
wiley   +1 more source

RFID security authentication scheme based on Montgomery-form elliptic curve cryptography

open access: yesDianxin kexue, 2016
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on ...
Wumei ZHANG
doaj   +2 more sources

COMPARATIVE ANALYSIS OF MOD-ECDH ALGORITHM WITH VARIOUS ALGORITHMS [PDF]

open access: yesInternational Journal of Industrial Engineering and Production Research, 2020
Cryptography is a well-known and well-researched topic for ages. Cryptography is the first line of defense for any networked system. By using Symmetric as well as Asymmetric Cryptography a lot of algorithms are developed. From the security point of view,
O Sri Nagesh, Vankamamidi S Naresh
doaj   +1 more source

Home - About - Disclaimer - Privacy