Results 11 to 20 of about 286,982 (344)

Similarity Calculation Based on Homomorphic Encryption [PDF]

open access: yes, 2023
In recent years, although some homomorphic encryption algorithms have been proposed to provide additive homomorphic encryption and multiplicative homomorphic encryption. However, similarity measures are required for searches and queries under homomorphic encrypted ciphertexts.
arxiv   +1 more source

Taming Energy Cost of Disk Encryption Software on Data-Intensive Mobile Devices [PDF]

open access: yes, 2016
Disk encryption is frequently used to secure confidential data on mobile devices. However, the high energy cost of disk encryption poses a heavy burden on those devices with limited battery capacity especially when a large amount of data needs to be ...
Hu, Wenjun   +5 more
core   +2 more sources

High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography

open access: yesIEEE Access, 2019
This paper presents a high-secure fingerprint authentication system using ring learning with errors (ring-LWE) cryptography to protect users' fingerprint data more securely.
Tuy Nguyen Tan, Hanho Lee
doaj   +1 more source

Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing

open access: yesIEEE Access, 2018
Cloud computing and social networks are changing the way of healthcare by providing realtime data sharing in a cost-effective manner. However, data security issue is one of the main obstacles to the wide application of mobile healthcare social networks ...
Qinlong Huang   +3 more
doaj   +1 more source

Forward-secure hierarchical predicate encryption [PDF]

open access: yes, 2012
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan   +2 more
core   +2 more sources

CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2022
Subject of research: crypto-resistant methods and tools of generating random sequences and hardware support of cryptographic transformations in IoT devices. The aim of the article is to study crypto-resistant methods and tools for generating and testing
Petro Klimushyn   +5 more
doaj   +1 more source

A Review of Secure and Privacy-Preserving Medical Data Sharing

open access: yesIEEE Access, 2019
In the digital healthcare era, it is of the utmost importance to harness medical information scattered across healthcare institutions to support in-depth data analysis and achieve personalized healthcare.
Hao Jin   +3 more
doaj   +1 more source

CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing

open access: yesIEEE Access, 2017
Mobile device and its applications have revolutionized the way we store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone to security threats. In this paper,
Amit Banerjee   +3 more
doaj   +1 more source

Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System

open access: yesIEEE Access, 2018
Cloud-based electronic health record (EHR) systems enable medical documents to be exchanged between medical institutions; this is expected to contribute to improvements in various medical services in the future.
Kwangsoo Seol   +4 more
doaj   +1 more source

A Bijective Image Encryption System Based on Hybrid Chaotic Map Diffusion and DNA Confusion

open access: yesEntropy, 2020
Modern multimedia communications technology requirements have raised security standards, which allows for enormous development in security standards. This article presents an innovative symmetric cryptosystem that depends on the hybrid chaotic Lorenz ...
Dalia H. ElKamchouchi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy