Results 21 to 30 of about 459,845 (362)

Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography

open access: yesApplied Sciences, 2021
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world.
Ghadah Aldabbagh   +5 more
doaj   +1 more source

A dynamic assembly-induced emissive system for advanced information encryption with time-dependent security

open access: yesNature Communications, 2022
The development of advanced materials for information encryption with time-dependent features is essential to meet the increasing demand on encryption security.
Qianqian Wang   +5 more
semanticscholar   +1 more source

Chaotic image encryption using hopfield and hindmarsh–rose neurons implemented on FPGA [PDF]

open access: yes, 2020
Chaotic systems implemented by artificial neural networks are good candidates for data encryption. In this manner, this paper introduces the cryptographic application of the Hopfield and the Hindmarsh–Rose neurons.
Cruz-Vega, Israel   +7 more
core   +2 more sources

Mobility Prediction-Based Optimisation and Encryption of Passenger Traffic-Flows Using Machine Learning

open access: yesSensors, 2020
Information and Communication Technology (ICT) enabled optimisation of train’s passenger traffic flows is a key consideration of transportation under Smart City planning (SCP).
Syed Muhammad Asad   +5 more
doaj   +1 more source

A Secure Steganographic Channel Using DNA Sequence Data and a Bio-Inspired XOR Cipher

open access: yesInformation, 2021
Secure communication is becoming an urgent need in a digital world where tera bytes of sensitive information are sent back and forth over public networks.
Amal Khalifa
doaj   +1 more source

Order-Revealing Encryption and the Hardness of Private Learning [PDF]

open access: yes, 2015
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use order-revealing encryption to separate computationally efficient PAC learning
A Beimel   +27 more
core   +2 more sources

Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption [PDF]

open access: yes, 2020
An affine determinant program ADP: {0,1}^n → {0,1} is specified by a tuple (A,B_1,...,B_n) of square matrices over F_q and a function Eval: F_q → {0,1}, and evaluated on x \in {0,1}^n by computing Eval(det(A + sum_{i \in [n]} x_i B_i)).
Bartusek, James   +5 more
core   +2 more sources

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

open access: yesIEEE Access, 2021
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi   +5 more
doaj   +1 more source

Metasurface-based key for computational imaging encryption

open access: yesScience Advances, 2021
A single metasurface operates as a reusable generator of different keys to encode various secret images in a computational way. Optical metasurfaces can offer high-quality multichannel displays by modulating different degrees of freedom of light ...
Peixia Zheng   +7 more
semanticscholar   +1 more source

On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]

open access: yes, 2006
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat   +4 more
core   +6 more sources

Home - About - Disclaimer - Privacy