Results 31 to 40 of about 404,295 (388)

Metasurface-based key for computational imaging encryption

open access: yesScience Advances, 2021
A single metasurface operates as a reusable generator of different keys to encode various secret images in a computational way. Optical metasurfaces can offer high-quality multichannel displays by modulating different degrees of freedom of light ...
Peixia Zheng   +7 more
semanticscholar   +1 more source

A Color Image Encryption Using Dynamic DNA and 4-D Memristive Hyper-Chaos

open access: yesIEEE Access, 2019
In this paper, a color image encryption is proposed based on the dynamic DNA and the 4-D memristive hyper-chaos. First, chaotic matrices are generated from the 4-D memristive hyper-chaos by using the plain image, the salt key, and control parameters ...
Zhentao Liu   +3 more
doaj   +1 more source

Algorithms for solving a class of real quasi-symmetric Toeplitz linear systems and its applications

open access: yesElectronic Research Archive, 2023
In this paper, fast numerical methods for solving the real quasi-symmetric Toeplitz linear system are studied in two stages. First, based on an order-reduction algorithm and the factorization of Toeplitz matrix inversion, a sequence of linear systems ...
Xing Zhang   +3 more
doaj   +1 more source

Real-time chaotic video encryption based on multithreaded parallel confusion and diffusion [PDF]

open access: yesInformation Sciences 666, 120420 (2024), 2023
Due to the strong correlation between adjacent pixels, most image encryption schemes perform multiple rounds of confusion and diffusion to protect the image against attacks. Such operations, however, are time-consuming, cannot meet the real-time requirements of video encryption.
arxiv   +1 more source

Blind Functional Encryption [PDF]

open access: yes, 2020
Functional encryption (FE) gives the power to retain control of sensitive information and is particularly suitable in several practical real-world use cases. Using this primitive, anyone having a specific functional decryption key (derived from some master secret key) could only obtain the evaluation of an authorized function f over a message m, given ...
Canard, Sébastien   +2 more
openaire   +4 more sources

Secure and Private Implementation of Dynamic Controllers Using Semi-Homomorphic Encryption [PDF]

open access: yes, 2019
This paper presents a secure and private implementation of linear time-invariant dynamic controllers using Paillier's encryption, a semi-homomorphic encryption method.
Farokhi, Farhad   +2 more
core   +2 more sources

CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing

open access: yesIEEE Access, 2017
Mobile device and its applications have revolutionized the way we store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone to security threats. In this paper,
Amit Banerjee   +3 more
doaj   +1 more source

Comparative evaluation of different methods of "Homomorphic Encryption" and "Traditional Encryption" on a dataset with current problems and developments [PDF]

open access: yesarXiv, 2022
A database is a prime target for cyber-attacks as it contains confidential, sensitive, or protected information. With the increasing sophistication of the internet and dependencies on internet data transmission, it has become vital to be aware of various encryption technologies and trends. It can assist in safeguarding private information and sensitive
arxiv  

Searchable symmetric encryption: improved definitions and efficient constructions

open access: yesConference on Computer and Communications Security, 2006
Searchable symmetric encryption (SSE) allows a party to outsource the storage of its data to another party (a server) in a private manner, while maintaining the ability to selectively search over it.
Reza Curtmola   +3 more
semanticscholar   +1 more source

Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System

open access: yesIEEE Access, 2018
Cloud-based electronic health record (EHR) systems enable medical documents to be exchanged between medical institutions; this is expected to contribute to improvements in various medical services in the future.
Kwangsoo Seol   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy