Results 11 to 20 of about 264,588 (256)
Information and Communication Technology (ICT) enabled optimisation of train’s passenger traffic flows is a key consideration of transportation under Smart City planning (SCP).
Syed Muhammad Asad +5 more
doaj +1 more source
Physical-Layer Security in Power-Domain NOMA Based on Different Chaotic Maps
Nonorthogonal multiple access (NOMA) is a relevant technology for realizing the primary goals of next-generation wireless networks, such as high connectivity and stability.
Mariam Abu Al-Atta +3 more
doaj +1 more source
Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol [PDF]
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful ...
Bonsma-Fisher, Kent +6 more
core +2 more sources
Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).
Bouganim, Luc, Guo, Yanli
openaire +3 more sources
The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data.
Volodymyr Korchynskyi +5 more
doaj +1 more source
Reversible Data Hiding in Encrypted Images Based on Two-Round Image Interpolation
The data embedding of vacating room after encryption reversible data hiding in encrypted images (VRAE RDHEI) is performed on an encrypted image without redundancy and spatial correlation.
Qing Zhang, Kaimeng Chen
doaj +1 more source
Order-Revealing Encryption and the Hardness of Private Learning [PDF]
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use order-revealing encryption to separate computationally efficient PAC learning
A Beimel +27 more
core +2 more sources
Area-Time Efficient Hardware Architecture for CRYSTALS-Kyber
This paper presents a novel area-time efficient hardware architecture of the lattice-based CRYSTALS-Kyber, which has entered the third round of the post-quantum cryptography standardization competition hosted by the National Institute of Standards and ...
Tuy Tan Nguyen +3 more
doaj +1 more source
A Novel Encryption Scheme in Ship Remote Control against Differential Fault Attack
Cyber security has drawn more attention in the research of intelligent and unmanned ships. The remote control command transmitted in time sequence has a high similarity.
Hong Zeng +4 more
doaj +1 more source
Chaotic image encryption using hopfield and hindmarsh–rose neurons implemented on FPGA [PDF]
Chaotic systems implemented by artificial neural networks are good candidates for data encryption. In this manner, this paper introduces the cryptographic application of the Hopfield and the Hindmarsh–Rose neurons.
Cruz-Vega, Israel +7 more
core +2 more sources

