Results 11 to 20 of about 327,487 (331)

Secure and Private Implementation of Dynamic Controllers Using Semi-Homomorphic Encryption [PDF]

open access: yes, 2019
This paper presents a secure and private implementation of linear time-invariant dynamic controllers using Paillier's encryption, a semi-homomorphic encryption method.
Farokhi, Farhad   +2 more
core   +2 more sources

Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning

open access: yesSensors, 2020
Information and Communication Technology (ICT) enabled optimisation of train’s passenger traffic flows is a key consideration of transportation under Smart City planning (SCP).
Syed Muhammad Asad   +5 more
doaj   +1 more source

Physical-Layer Security in Power-Domain NOMA Based on Different Chaotic Maps

open access: yesEntropy, 2023
Nonorthogonal multiple access (NOMA) is a relevant technology for realizing the primary goals of next-generation wireless networks, such as high connectivity and stability.
Mariam Abu Al-Atta   +3 more
doaj   +1 more source

Database Encryption [PDF]

open access: yes, 2011
Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).
Bouganim, Luc, Guo, Yanli
openaire   +3 more sources

Method of information protection based on the integration of probabilistic encryption and noise immune coding

open access: yesРадіоелектронні і комп'ютерні системи, 2023
The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data.
Volodymyr Korchynskyi   +5 more
doaj   +1 more source

Reversible Data Hiding in Encrypted Images Based on Two-Round Image Interpolation

open access: yesMathematics, 2023
The data embedding of vacating room after encryption reversible data hiding in encrypted images (VRAE RDHEI) is performed on an encrypted image without redundancy and spatial correlation.
Qing Zhang, Kaimeng Chen
doaj   +1 more source

Area-Time Efficient Hardware Architecture for CRYSTALS-Kyber

open access: yesApplied Sciences, 2022
This paper presents a novel area-time efficient hardware architecture of the lattice-based CRYSTALS-Kyber, which has entered the third round of the post-quantum cryptography standardization competition hosted by the National Institute of Standards and ...
Tuy Tan Nguyen   +3 more
doaj   +1 more source

A Novel Encryption Scheme in Ship Remote Control against Differential Fault Attack

open access: yesApplied Sciences, 2022
Cyber security has drawn more attention in the research of intelligent and unmanned ships. The remote control command transmitted in time sequence has a high similarity.
Hong Zeng   +4 more
doaj   +1 more source

Comparative Study of Database Security In Cloud Computing Using AES and DES Encryption Algorithms

open access: yesJournal of Information Security and Cybercrimes Research, 2019
Security is consider as one of the largest part important aspects in daily computing. The security is important in cloud computing especially for data save in cloud because it have sensitivity and import data as well many user can access to same data ...
Nora Abdullah Al-gohany   +1 more
doaj   +1 more source

Data Privacy in the Digital Era: Machine Learning Solutions for Confidentiality [PDF]

open access: yesE3S Web of Conferences
Data privacy has grown to be of utmost importance in today's digitally driven world. Protecting sensitive information has never been more important due to the explosion of data across many areas.
Dari Sukhvinder Singh   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy