Results 31 to 40 of about 299,742 (318)
In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested for secure image transmission over the IoT network.
Esam A. A. Hagras+3 more
doaj +1 more source
On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat+4 more
core +6 more sources
Using of tiny encryption algorithm in CAN-Bus communication
The rising costs of agriculture machine operation force manufacturers to look for solutions that simplify the machine operation to its users and increase user comfort.
M. Jukl, J. Čupera
doaj +1 more source
Strike: Stream Cipher Based on Stochastic Lightning Strike Behaviour
There is an increasing need for secure and fast encryption algorithms to support applications and communication protocols, and business models. In this paper, we present an alternative stream cipher (Strike) inspired by the stochastic behaviour of ...
Khaled Suwais, Sally Almanasra
doaj +1 more source
Digital Key Distribution Protected by Recorded Quantum Noise
A new digital key distribution and encryption system for broad use is presented. It offers affordable perfect security for in-transit digital communications and is quantum-resistant.
Geraldo A. A
doaj +1 more source
Color image encryption via compressive sensing and chaotic systems [PDF]
In this paper, we design a color image encryption algorithm based on chaotic system and block compressive sensing. Firstly, the sparse representation of the plain-image is obtained by an adaptive learning dictionary.
Zhu Kaige, Cheng Jinli
doaj +1 more source
Cryptanalysis of a computer cryptography scheme based on a filter bank [PDF]
This paper analyzes the security of a recently-proposed signal encryption scheme based on a filter bank. A very critical weakness of this new signal encryption procedure is exploited in order to successfully recover the associated secret key.Comment: 6 ...
Alvarez+14 more
core +3 more sources
Artificial intelligence in data storage systems
Introduction. The artificial intelligence (AI) performance in data storage systems is considered. When working with data, the advantage of its use both in economic terms and for security is determined. The work objective is the introduction of artificial
V. V. Zhilin, O. A. Safar'yan
doaj +1 more source
On the Optimality of Quantum Encryption Schemes
It is well known that n bits of entropy are necessary and sufficient to perfectly encrypt n bits (one-time pad). Even if we allow the encryption to be approximate, the amount of entropy needed doesn't asymptotically change.
Daniel Nagaj+2 more
core +1 more source
Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy
The Internet of Things (IoT) is a technology that can connect billions of devices or “things” to other devices (machine to machine) or even to people via an existing infrastructure.
Ali Eghmazi+3 more
doaj +1 more source