Results 11 to 20 of about 404,295 (388)

A dynamic assembly-induced emissive system for advanced information encryption with time-dependent security

open access: yesNature Communications, 2022
The development of advanced materials for information encryption with time-dependent features is essential to meet the increasing demand on encryption security.
Qianqian Wang   +5 more
semanticscholar   +1 more source

Database Encryption [PDF]

open access: yes, 2011
Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).
Bouganim, Luc, Guo, Yanli
openaire   +4 more sources

Ascon v1.2: Lightweight Authenticated Encryption and Hashing

open access: yesJournal of Cryptology, 2021
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our information infrastructure. In this paper, we provide the specification of Ascon-128 and Ascon-128a.
Christoph Dobraunig   +3 more
semanticscholar   +1 more source

A Review of Secure and Privacy-Preserving Medical Data Sharing

open access: yesIEEE Access, 2019
In the digital healthcare era, it is of the utmost importance to harness medical information scattered across healthcare institutions to support in-depth data analysis and achieve personalized healthcare.
Hao Jin   +3 more
doaj   +1 more source

Ciphertext-Policy Attribute-Based Encryption

open access: yesIEEE Symposium on Security and Privacy, 2007
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such policies is to employ a trusted server to store the data and mediate ...
J. Bethencourt, A. Sahai, Brent Waters
semanticscholar   +1 more source

Fully homomorphic encryption using ideal lattices

open access: yesSymposium on the Theory of Computing, 2009
We propose a fully homomorphic encryption scheme -- i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in three steps.
Craig Gentry
semanticscholar   +1 more source

Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains

open access: yesInternational Journal of Information Security, 2022
Chaos-based cryptosystems have been an active area of research in recent years. Although these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems like Chebyshev polynomials can provide additional security when used with ...
Unsub Zia   +6 more
semanticscholar   +1 more source

Owner Specified Excessive Access Control for Attribute Based Encryption

open access: yesIEEE Access, 2016
Attribute-based encryption (ABE) has emerged as a promising solution for access control to diverse set of users in cloud computing systems. Policy can just specify whether (or not) any specific user should be given access to data, but it lacks to provide
Fawad Khan, Hui Li, Liangxuan Zhang
doaj   +1 more source

Similarity Calculation Based on Homomorphic Encryption [PDF]

open access: yes, 2023
In recent years, although some homomorphic encryption algorithms have been proposed to provide additive homomorphic encryption and multiplicative homomorphic encryption. However, similarity measures are required for searches and queries under homomorphic encrypted ciphertexts.
arxiv   +1 more source

Home - About - Disclaimer - Privacy