Results 21 to 30 of about 299,742 (318)

Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model

open access: yesSensors, 2022
This article presents non-invasive sensing-based diagnoses of pneumonia disease, exploiting a deep learning model to make the technique non-invasive coupled with security preservation.
Mujeeb Ur Rehman   +9 more
doaj   +1 more source

An encryption-encoding architecture for security enhancement in 5G communication networks [PDF]

open access: yesITM Web of Conferences, 2023
This article introduces a hybrid architecture of cryptography and coding technique to provide security in 5G communication networks. There are various types of attacks in 5G communication systems.
Das Anwesha   +3 more
doaj   +1 more source

Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective

open access: yesMathematics, 2023
With the growing demand for digitalization, multimedia data transmission through wireless networks has become more prominent. These multimedia data include text, images, audio, and video.
Hemalatha Mahalingam   +4 more
doaj   +1 more source

Probabilistic encryption

open access: yesJournal of Computer and System Sciences, 1984
A new probabilistic model of data encryption is introduced. For this model, under suitable complexity assumptions, it is proved that extracting any information about the cleartext from the cyphertext is hard on the average for an adversary with polynomially bounded computational resources.
Goldwasser, Shafi, Micali, Silvio
openaire   +2 more sources

Order-Revealing Encryption and the Hardness of Private Learning [PDF]

open access: yes, 2015
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use order-revealing encryption to separate computationally efficient PAC learning
A Beimel   +27 more
core   +2 more sources

Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption [PDF]

open access: yes, 2020
An affine determinant program ADP: {0,1}^n → {0,1} is specified by a tuple (A,B_1,...,B_n) of square matrices over F_q and a function Eval: F_q → {0,1}, and evaluated on x \in {0,1}^n by computing Eval(det(A + sum_{i \in [n]} x_i B_i)).
Bartusek, James   +5 more
core   +2 more sources

An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors

open access: yesEntropy, 2022
An approach for the cryptographic security enhancement of encryption is proposed and analyzed. The enhancement is based on the employment of a coding scheme and degradation of the ciphertext.
Miodrag J. Mihaljević   +2 more
doaj   +1 more source

Concisely Indexed Multi-Keyword Rank Search on Encrypted Cloud Documents

open access: yesApplied Sciences, 2021
With the advent of cloud computing, the low-cost and high-capacity cloud storages have attracted people to move their data from local computers to the remote facilities.
Tai-Lin Chin, Wan-Ni Shih
doaj   +1 more source

Using Blockchain to Ensure Trust between Donor Agencies and NGOs in Under-Developed Countries

open access: yesComputers, 2021
Non-governmental organizations (NGOs) in under-developed countries are receiving funds from donor agencies for various purposes, including relief from natural disasters and other emergencies, promoting education, women empowerment, economic development ...
Ehsan Rehman   +5 more
doaj   +1 more source

Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol [PDF]

open access: yes, 2020
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful ...
Bonsma-Fisher, Kent   +6 more
core   +2 more sources

Home - About - Disclaimer - Privacy