Results 21 to 30 of about 478,748 (354)
Implementation of super H-antimagic total graph on establishing stream cipher
This paper is aimed to study the use of super (a, d)-H antimagic total graph on generating encryption keys that can be used to establish a stream cipher. Methodology to achieve this goal was undertaken in three steps. First of all the existence of super (
Antonius Cahya Prihandoko +2 more
doaj +1 more source
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption [PDF]
An affine determinant program ADP: {0,1}^n → {0,1} is specified by a tuple (A,B_1,...,B_n) of square matrices over F_q and a function Eval: F_q → {0,1}, and evaluated on x \in {0,1}^n by computing Eval(det(A + sum_{i \in [n]} x_i B_i)).
Bartusek, James +5 more
core +2 more sources
Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning
Privacy protection has been an important concern with the great success of machine learning. In this paper, it proposes a multi-party privacy preserving machine learning framework, named PFMLP, based on partially homomorphic encryption and federated ...
H. Fang, Q. Qian
semanticscholar +1 more source
Healthchain: A Privacy Protection System for Medical Data Based on Blockchain
Recently, with the great development of e-health, more and more countries have made certain achievements in the field of electronic medical treatment. The digitization of medical equipment and the structuralization of electronic medical records are the ...
Baocheng Wang, Zetao Li
doaj +1 more source
The utilization of mobile learning continues to rise and has attracted many organizations, university environments and institutions of higher education all over the world.
Ghadah Aldabbagh +5 more
doaj +1 more source
Information and Communication Technology (ICT) enabled optimisation of train’s passenger traffic flows is a key consideration of transportation under Smart City planning (SCP).
Syed Muhammad Asad +5 more
doaj +1 more source
A Secure Steganographic Channel Using DNA Sequence Data and a Bio-Inspired XOR Cipher
Secure communication is becoming an urgent need in a digital world where tera bytes of sensitive information are sent back and forth over public networks.
Amal Khalifa
doaj +1 more source
Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).
Bouganim, Luc, Guo, Yanli
openaire +3 more sources
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map.
Shenli Zhu +3 more
semanticscholar +1 more source
Order-Revealing Encryption and the Hardness of Private Learning [PDF]
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use order-revealing encryption to separate computationally efficient PAC learning
A Beimel +27 more
core +2 more sources

