A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare [PDF]
, 2008Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee).
Hartel, Pieter+3 more
core +29 more sources
A Compression Algorithm for DNA Palindrome Compression Technique [PDF]
ITM Web of Conferences, 2020Data Compression in Cryptography is one of the interesting research topic. The compression process reduces the amount of transferring data as well as storage space which in turn effects the usage of bandwidth.
Suneetha D.+2 more
doaj +1 more source
A Novel Model for Distributed Denial of Service Attack Analysis and Interactivity
Symmetry, 2021A Distributed Denial of Service (DDoS) attack is a type of cybercrime that renders a target service unavailable by overwhelming it with traffic from several sources (attack nodes).
Ashraf Ahmad+2 more
doaj +1 more source
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
IEEE Access, 2021With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security.
Saeed Ullah Jan, Habib Ullah Khan
doaj +1 more source
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Mathematics, 2023In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map.
Shenli Zhu+3 more
semanticscholar +1 more source
Probing 3D chaotic Thomas’ cyclically attractor with multimedia encryption and electronic circuitry [PDF]
Archives of Control Sciences, 2023This study investigates Thomas’ cyclically symmetric attractor dynamics with mathematical and electronic simulations using a proportional fractional derivative to comprehend the dynamics of a given chaotic system.
NajeebAlam Khan+3 more
doaj +1 more source
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing
IEEE Access, 2020Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso+4 more
doaj +1 more source
Cryptography in Qajar Period Passing Through the Traditional Cryptography to the Modern One [PDF]
تاریخ نگری و تاریخ نگاری, 2019There have been encrypted connections among human societies for sending confidential messages a long time ago. In the history of Iran also many encryption lines have been used by crypto-writers.
Samad Kavousi Rakati
doaj +1 more source
A Scoping Study on Lightweight Cryptography Reviews in IoT
Baghdad Science Journal, 2021The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms.
Ikenna Rene Chiadighikaobi +1 more
doaj +1 more source
Ciphertext-Policy Attribute-Based Encryption
IEEE Symposium on Security and Privacy, 2007In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such policies is to employ a trusted server to store the data and mediate ...
J. Bethencourt, A. Sahai, Brent Waters
semanticscholar +1 more source