Results 21 to 30 of about 299,742 (318)
This article presents non-invasive sensing-based diagnoses of pneumonia disease, exploiting a deep learning model to make the technique non-invasive coupled with security preservation.
Mujeeb Ur Rehman+9 more
doaj +1 more source
An encryption-encoding architecture for security enhancement in 5G communication networks [PDF]
This article introduces a hybrid architecture of cryptography and coding technique to provide security in 5G communication networks. There are various types of attacks in 5G communication systems.
Das Anwesha+3 more
doaj +1 more source
Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective
With the growing demand for digitalization, multimedia data transmission through wireless networks has become more prominent. These multimedia data include text, images, audio, and video.
Hemalatha Mahalingam+4 more
doaj +1 more source
A new probabilistic model of data encryption is introduced. For this model, under suitable complexity assumptions, it is proved that extracting any information about the cleartext from the cyphertext is hard on the average for an adversary with polynomially bounded computational resources.
Goldwasser, Shafi, Micali, Silvio
openaire +2 more sources
Order-Revealing Encryption and the Hardness of Private Learning [PDF]
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use order-revealing encryption to separate computationally efficient PAC learning
A Beimel+27 more
core +2 more sources
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption [PDF]
An affine determinant program ADP: {0,1}^n → {0,1} is specified by a tuple (A,B_1,...,B_n) of square matrices over F_q and a function Eval: F_q → {0,1}, and evaluated on x \in {0,1}^n by computing Eval(det(A + sum_{i \in [n]} x_i B_i)).
Bartusek, James+5 more
core +2 more sources
An approach for the cryptographic security enhancement of encryption is proposed and analyzed. The enhancement is based on the employment of a coding scheme and degradation of the ciphertext.
Miodrag J. Mihaljević+2 more
doaj +1 more source
Concisely Indexed Multi-Keyword Rank Search on Encrypted Cloud Documents
With the advent of cloud computing, the low-cost and high-capacity cloud storages have attracted people to move their data from local computers to the remote facilities.
Tai-Lin Chin, Wan-Ni Shih
doaj +1 more source
Using Blockchain to Ensure Trust between Donor Agencies and NGOs in Under-Developed Countries
Non-governmental organizations (NGOs) in under-developed countries are receiving funds from donor agencies for various purposes, including relief from natural disasters and other emergencies, promoting education, women empowerment, economic development ...
Ehsan Rehman+5 more
doaj +1 more source
Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol [PDF]
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful ...
Bonsma-Fisher, Kent+6 more
core +2 more sources