Results 31 to 40 of about 478,748 (354)

A Survey on Homomorphic Encryption Schemes [PDF]

open access: yesACM Computing Surveys, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Abbas Acar   +3 more
semanticscholar   +1 more source

Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol [PDF]

open access: yes, 2020
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful ...
Bonsma-Fisher, Kent   +6 more
core   +2 more sources

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

open access: yesIEEE Access, 2021
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi   +5 more
doaj   +1 more source

Chaotic image encryption using hopfield and hindmarsh–rose neurons implemented on FPGA [PDF]

open access: yes, 2020
Chaotic systems implemented by artificial neural networks are good candidates for data encryption. In this manner, this paper introduces the cryptographic application of the Hopfield and the Hindmarsh–Rose neurons.
Cruz-Vega, Israel   +7 more
core   +2 more sources

Survey on Fully Homomorphic Encryption, Theory, and Applications

open access: yesProceedings of the IEEE, 2022
Data privacy concerns are increasing significantly in the context of the Internet of Things, cloud services, edge computing, artificial intelligence applications, and other applications enabled by next-generation networks.
Chiara Marcolla   +5 more
semanticscholar   +1 more source

A dynamic assembly-induced emissive system for advanced information encryption with time-dependent security

open access: yesNature Communications, 2022
The development of advanced materials for information encryption with time-dependent features is essential to meet the increasing demand on encryption security.
Qianqian Wang   +5 more
semanticscholar   +1 more source

Comparative Study of Database Security In Cloud Computing Using AES and DES Encryption Algorithms

open access: yesJournal of Information Security and Cybercrimes Research, 2019
Security is consider as one of the largest part important aspects in daily computing. The security is important in cloud computing especially for data save in cloud because it have sensitivity and import data as well many user can access to same data ...
Nora Abdullah Al-gohany   +1 more
doaj   +1 more source

Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains

open access: yesInternational Journal of Information Security, 2022
Chaos-based cryptosystems have been an active area of research in recent years. Although these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems like Chebyshev polynomials can provide additional security when used with ...
Unsub Zia   +6 more
semanticscholar   +1 more source

Cryptanalysis of a computer cryptography scheme based on a filter bank [PDF]

open access: yes, 2007
This paper analyzes the security of a recently-proposed signal encryption scheme based on a filter bank. A very critical weakness of this new signal encryption procedure is exploited in order to successfully recover the associated secret key.Comment: 6 ...
Alvarez   +14 more
core   +3 more sources

Data Privacy in the Digital Era: Machine Learning Solutions for Confidentiality [PDF]

open access: yesE3S Web of Conferences
Data privacy has grown to be of utmost importance in today's digitally driven world. Protecting sensitive information has never been more important due to the explosion of data across many areas.
Dari Sukhvinder Singh   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy