Results 11 to 20 of about 299,742 (318)

Applications of attack mitigation mechanisms in energy networks, attack detection and preventive methods for security in the smart grid [PDF]

open access: yesE3S Web of Conferences
The Smart Grid promotes energy and environmental sustainability through the integration of vast distributed energy resources. The implementation of such a green system has huge economic and social benefits.
Simeonidis Dimitrios
doaj   +1 more source

Database Encryption

open access: yes, 2023
International ...
Anciaux, Nicolas   +2 more
openaire   +3 more sources

Implementation of super H-antimagic total graph on establishing stream cipher

open access: yesIndonesian Journal of Combinatorics, 2019
This paper is aimed to study the use of super (a, d)-H antimagic total graph on generating encryption keys that can be used to establish a stream cipher. Methodology to achieve this goal was undertaken in three steps. First of all the existence of super (
Antonius Cahya Prihandoko   +2 more
doaj   +1 more source

Towards Secure and Efficient "white-box" Encryption [PDF]

open access: yesJournal of Universal Computer Science, 2019
In many applications implemented in mistrusted environments all operations with the secret key during an encryption operation are "obfuscated" in a way that while an attacker has access to all routines of operations, it will nevertheless be ...
Gurgen Khachatrian, Sergey Abrahamyan
doaj   +3 more sources

Privacy-Preserving Collective Learning With Homomorphic Encryption

open access: yesIEEE Access, 2021
Deep learning models such as long short-term memory (LSTM) are valuable classifiers for time series data like hourly clinical statistics. However, access to health data is challenging due to privacy and legal issues.
Jestine Paul   +5 more
doaj   +1 more source

Database Encryption [PDF]

open access: yes, 2011
Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).
Bouganim, Luc, Guo, Yanli
openaire   +3 more sources

Chaotic image encryption using hopfield and hindmarsh–rose neurons implemented on FPGA [PDF]

open access: yes, 2020
Chaotic systems implemented by artificial neural networks are good candidates for data encryption. In this manner, this paper introduces the cryptographic application of the Hopfield and the Hindmarsh–Rose neurons.
Cruz-Vega, Israel   +7 more
core   +2 more sources

Serial encryption using the functions of real variable

open access: yesРадіоелектронні і комп'ютерні системи, 2021
Context. Using the functions of a real variable in cryptosystems as keys allow increasing their cryptographic strength since it is more difficult to select such keys. Therefore, the development of such systems is relevant. Objective.
Viktor Avramenko, Volodymyr Demianenko
doaj   +1 more source

Data Privacy in the Digital Era: Machine Learning Solutions for Confidentiality [PDF]

open access: yesE3S Web of Conferences
Data privacy has grown to be of utmost importance in today's digitally driven world. Protecting sensitive information has never been more important due to the explosion of data across many areas.
Dari Sukhvinder Singh   +4 more
doaj   +1 more source

Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2011
In this letter, a new digital watermarking algorithm is proposed to hide binary image watermark inside gray image to increase authentication and robustness, DWT are used in embedding because it has many features in image processing.
Shaimaa Mohammad
doaj   +1 more source

Home - About - Disclaimer - Privacy