Comparative Study of Database Security In Cloud Computing Using AES and DES Encryption Algorithms
Security is consider as one of the largest part important aspects in daily computing. The security is important in cloud computing especially for data save in cloud because it have sensitivity and import data as well many user can access to same data ...
Nora Abdullah Al-gohany +1 more
doaj +1 more source
The Effect of Using Cryptology on Understanding of Function Concept
The aim of the study is to teach the concept of function by using cryptology and to examine whether it provides support to students who have difficulty in integrating this subject into daily life.
Ramazan EROL, Elif SAYGI
doaj +1 more source
Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol [PDF]
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful ...
Bonsma-Fisher, Kent +6 more
core +2 more sources
Data Privacy in the Digital Era: Machine Learning Solutions for Confidentiality [PDF]
Data privacy has grown to be of utmost importance in today's digitally driven world. Protecting sensitive information has never been more important due to the explosion of data across many areas.
Dari Sukhvinder Singh +4 more
doaj +1 more source
Digital Key Distribution Protected by Recorded Quantum Noise
A new digital key distribution and encryption system for broad use is presented. It offers affordable perfect security for in-transit digital communications and is quantum-resistant.
Geraldo A. A
doaj +1 more source
Towards Secure and Efficient "white-box" Encryption [PDF]
In many applications implemented in mistrusted environments all operations with the secret key during an encryption operation are "obfuscated" in a way that while an attacker has access to all routines of operations, it will nevertheless be ...
Gurgen Khachatrian, Sergey Abrahamyan
doaj +3 more sources
Privacy-Preserving Collective Learning With Homomorphic Encryption
Deep learning models such as long short-term memory (LSTM) are valuable classifiers for time series data like hourly clinical statistics. However, access to health data is challenging due to privacy and legal issues.
Jestine Paul +5 more
doaj +1 more source
On the Optimality of Quantum Encryption Schemes
It is well known that n bits of entropy are necessary and sufficient to perfectly encrypt n bits (one-time pad). Even if we allow the encryption to be approximate, the amount of entropy needed doesn't asymptotically change.
Daniel Nagaj +2 more
core +1 more source
Cryptanalysis of a computer cryptography scheme based on a filter bank [PDF]
This paper analyzes the security of a recently-proposed signal encryption scheme based on a filter bank. A very critical weakness of this new signal encryption procedure is exploited in order to successfully recover the associated secret key.Comment: 6 ...
Alvarez +14 more
core +3 more sources
Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy
The Internet of Things (IoT) is a technology that can connect billions of devices or “things” to other devices (machine to machine) or even to people via an existing infrastructure.
Ali Eghmazi +3 more
doaj +1 more source

