Results 21 to 30 of about 264,588 (256)

Comparative Study of Database Security In Cloud Computing Using AES and DES Encryption Algorithms

open access: yesJournal of Information Security and Cybercrimes Research, 2019
Security is consider as one of the largest part important aspects in daily computing. The security is important in cloud computing especially for data save in cloud because it have sensitivity and import data as well many user can access to same data ...
Nora Abdullah Al-gohany   +1 more
doaj   +1 more source

On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]

open access: yes, 2006
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat   +4 more
core   +6 more sources

Cryptanalysis of a computer cryptography scheme based on a filter bank [PDF]

open access: yes, 2007
This paper analyzes the security of a recently-proposed signal encryption scheme based on a filter bank. A very critical weakness of this new signal encryption procedure is exploited in order to successfully recover the associated secret key.Comment: 6 ...
Alvarez   +14 more
core   +3 more sources

Data Privacy in the Digital Era: Machine Learning Solutions for Confidentiality [PDF]

open access: yesE3S Web of Conferences
Data privacy has grown to be of utmost importance in today's digitally driven world. Protecting sensitive information has never been more important due to the explosion of data across many areas.
Dari Sukhvinder Singh   +4 more
doaj   +1 more source

Digital Key Distribution Protected by Recorded Quantum Noise

open access: yesIEEE Access
A new digital key distribution and encryption system for broad use is presented. It offers affordable perfect security for in-transit digital communications and is quantum-resistant.
Geraldo A. A
doaj   +1 more source

On the Optimality of Quantum Encryption Schemes

open access: yes, 2005
It is well known that n bits of entropy are necessary and sufficient to perfectly encrypt n bits (one-time pad). Even if we allow the encryption to be approximate, the amount of entropy needed doesn't asymptotically change.
Daniel Nagaj   +2 more
core   +1 more source

Attribute‐based encryption implies identity‐based encryption [PDF]

open access: yesIET Information Security, 2017
In this study, the author formally proves that designing attribute‐based encryption schemes cannot be easier than designing identity‐based encryption schemes. In more detail, they show how an attribute‐based encryption scheme which admits, at least, and policies can be combined with a ...
openaire   +3 more sources

Uncloneable encryption

open access: yesQuantum Information and Computation, 2003
Quantum states cannot be cloned. I show how to extend this property to classical messages encoded using quantum states, a task I call ``uncloneable encryption.'' An uncloneable encryption scheme has the property that an eavesdropper Eve not only cannot read the encrypted message, but she cannot copy it down for later decoding.
openaire   +2 more sources

Encrypted data processing with Homomorphic Re-Encryption

open access: yesInformation Sciences, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ding, Wenxiu   +3 more
openaire   +3 more sources

Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy

open access: yesIoT
The Internet of Things (IoT) is a technology that can connect billions of devices or “things” to other devices (machine to machine) or even to people via an existing infrastructure.
Ali Eghmazi   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy