Results 1 to 10 of about 385,241 (387)

A Compression Algorithm for DNA Palindrome Compression Technique [PDF]

open access: yesITM Web of Conferences, 2020
Data Compression in Cryptography is one of the interesting research topic. The compression process reduces the amount of transferring data as well as storage space which in turn effects the usage of bandwidth.
Suneetha D.   +2 more
doaj   +1 more source

A Novel Model for Distributed Denial of Service Attack Analysis and Interactivity

open access: yesSymmetry, 2021
A Distributed Denial of Service (DDoS) attack is a type of cybercrime that renders a target service unavailable by overwhelming it with traffic from several sources (attack nodes).
Ashraf Ahmad   +2 more
doaj   +1 more source

Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone

open access: yesIEEE Access, 2021
With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security.
Saeed Ullah Jan, Habib Ullah Khan
doaj   +1 more source

Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding

open access: yesMathematics, 2023
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map.
Shenli Zhu   +3 more
semanticscholar   +1 more source

Probing 3D chaotic Thomas’ cyclically attractor with multimedia encryption and electronic circuitry [PDF]

open access: yesArchives of Control Sciences, 2023
This study investigates Thomas’ cyclically symmetric attractor dynamics with mathematical and electronic simulations using a proportional fractional derivative to comprehend the dynamics of a given chaotic system.
NajeebAlam Khan   +3 more
doaj   +1 more source

Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing

open access: yesIEEE Access, 2020
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso   +4 more
doaj   +1 more source

Cryptography in Qajar Period Passing Through the Traditional Cryptography to the Modern One [PDF]

open access: yesتاریخ نگری و تاریخ نگاری, 2019
There have been encrypted connections among human societies for sending confidential messages a long time ago. In the history of Iran also many encryption lines have been used by crypto-writers.
Samad Kavousi Rakati
doaj   +1 more source

A Scoping Study on Lightweight Cryptography Reviews in IoT

open access: yesBaghdad Science Journal, 2021
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms.
Ikenna Rene Chiadighikaobi   +1 more
doaj   +1 more source

Ciphertext-Policy Attribute-Based Encryption

open access: yesIEEE Symposium on Security and Privacy, 2007
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such policies is to employ a trusted server to store the data and mediate ...
J. Bethencourt, A. Sahai, Brent Waters
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy