Results 11 to 20 of about 299,742 (318)
Applications of attack mitigation mechanisms in energy networks, attack detection and preventive methods for security in the smart grid [PDF]
The Smart Grid promotes energy and environmental sustainability through the integration of vast distributed energy resources. The implementation of such a green system has huge economic and social benefits.
Simeonidis Dimitrios
doaj +1 more source
Implementation of super H-antimagic total graph on establishing stream cipher
This paper is aimed to study the use of super (a, d)-H antimagic total graph on generating encryption keys that can be used to establish a stream cipher. Methodology to achieve this goal was undertaken in three steps. First of all the existence of super (
Antonius Cahya Prihandoko+2 more
doaj +1 more source
Towards Secure and Efficient "white-box" Encryption [PDF]
In many applications implemented in mistrusted environments all operations with the secret key during an encryption operation are "obfuscated" in a way that while an attacker has access to all routines of operations, it will nevertheless be ...
Gurgen Khachatrian, Sergey Abrahamyan
doaj +3 more sources
Privacy-Preserving Collective Learning With Homomorphic Encryption
Deep learning models such as long short-term memory (LSTM) are valuable classifiers for time series data like hourly clinical statistics. However, access to health data is challenging due to privacy and legal issues.
Jestine Paul+5 more
doaj +1 more source
Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).
Bouganim, Luc, Guo, Yanli
openaire +3 more sources
Chaotic image encryption using hopfield and hindmarsh–rose neurons implemented on FPGA [PDF]
Chaotic systems implemented by artificial neural networks are good candidates for data encryption. In this manner, this paper introduces the cryptographic application of the Hopfield and the Hindmarsh–Rose neurons.
Cruz-Vega, Israel+7 more
core +2 more sources
Serial encryption using the functions of real variable
Context. Using the functions of a real variable in cryptosystems as keys allow increasing their cryptographic strength since it is more difficult to select such keys. Therefore, the development of such systems is relevant. Objective.
Viktor Avramenko, Volodymyr Demianenko
doaj +1 more source
Data Privacy in the Digital Era: Machine Learning Solutions for Confidentiality [PDF]
Data privacy has grown to be of utmost importance in today's digitally driven world. Protecting sensitive information has never been more important due to the explosion of data across many areas.
Dari Sukhvinder Singh+4 more
doaj +1 more source
Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform [PDF]
In this letter, a new digital watermarking algorithm is proposed to hide binary image watermark inside gray image to increase authentication and robustness, DWT are used in embedding because it has many features in image processing.
Shaimaa Mohammad
doaj +1 more source