Results 11 to 20 of about 264,588 (256)

Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning

open access: yesSensors, 2020
Information and Communication Technology (ICT) enabled optimisation of train’s passenger traffic flows is a key consideration of transportation under Smart City planning (SCP).
Syed Muhammad Asad   +5 more
doaj   +1 more source

Physical-Layer Security in Power-Domain NOMA Based on Different Chaotic Maps

open access: yesEntropy, 2023
Nonorthogonal multiple access (NOMA) is a relevant technology for realizing the primary goals of next-generation wireless networks, such as high connectivity and stability.
Mariam Abu Al-Atta   +3 more
doaj   +1 more source

Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol [PDF]

open access: yes, 2020
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful ...
Bonsma-Fisher, Kent   +6 more
core   +2 more sources

Database Encryption [PDF]

open access: yes, 2011
Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).
Bouganim, Luc, Guo, Yanli
openaire   +3 more sources

Method of information protection based on the integration of probabilistic encryption and noise immune coding

open access: yesРадіоелектронні і комп'ютерні системи, 2023
The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data.
Volodymyr Korchynskyi   +5 more
doaj   +1 more source

Reversible Data Hiding in Encrypted Images Based on Two-Round Image Interpolation

open access: yesMathematics, 2023
The data embedding of vacating room after encryption reversible data hiding in encrypted images (VRAE RDHEI) is performed on an encrypted image without redundancy and spatial correlation.
Qing Zhang, Kaimeng Chen
doaj   +1 more source

Order-Revealing Encryption and the Hardness of Private Learning [PDF]

open access: yes, 2015
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use order-revealing encryption to separate computationally efficient PAC learning
A Beimel   +27 more
core   +2 more sources

Area-Time Efficient Hardware Architecture for CRYSTALS-Kyber

open access: yesApplied Sciences, 2022
This paper presents a novel area-time efficient hardware architecture of the lattice-based CRYSTALS-Kyber, which has entered the third round of the post-quantum cryptography standardization competition hosted by the National Institute of Standards and ...
Tuy Tan Nguyen   +3 more
doaj   +1 more source

A Novel Encryption Scheme in Ship Remote Control against Differential Fault Attack

open access: yesApplied Sciences, 2022
Cyber security has drawn more attention in the research of intelligent and unmanned ships. The remote control command transmitted in time sequence has a high similarity.
Hong Zeng   +4 more
doaj   +1 more source

Chaotic image encryption using hopfield and hindmarsh–rose neurons implemented on FPGA [PDF]

open access: yes, 2020
Chaotic systems implemented by artificial neural networks are good candidates for data encryption. In this manner, this paper introduces the cryptographic application of the Hopfield and the Hindmarsh–Rose neurons.
Cruz-Vega, Israel   +7 more
core   +2 more sources

Home - About - Disclaimer - Privacy