Results 31 to 40 of about 478,748 (354)
A Survey on Homomorphic Encryption Schemes [PDF]
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Abbas Acar +3 more
semanticscholar +1 more source
Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol [PDF]
A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful ...
Bonsma-Fisher, Kent +6 more
core +2 more sources
A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers.
Bader Alouffi +5 more
doaj +1 more source
Chaotic image encryption using hopfield and hindmarsh–rose neurons implemented on FPGA [PDF]
Chaotic systems implemented by artificial neural networks are good candidates for data encryption. In this manner, this paper introduces the cryptographic application of the Hopfield and the Hindmarsh–Rose neurons.
Cruz-Vega, Israel +7 more
core +2 more sources
Survey on Fully Homomorphic Encryption, Theory, and Applications
Data privacy concerns are increasing significantly in the context of the Internet of Things, cloud services, edge computing, artificial intelligence applications, and other applications enabled by next-generation networks.
Chiara Marcolla +5 more
semanticscholar +1 more source
The development of advanced materials for information encryption with time-dependent features is essential to meet the increasing demand on encryption security.
Qianqian Wang +5 more
semanticscholar +1 more source
Comparative Study of Database Security In Cloud Computing Using AES and DES Encryption Algorithms
Security is consider as one of the largest part important aspects in daily computing. The security is important in cloud computing especially for data save in cloud because it have sensitivity and import data as well many user can access to same data ...
Nora Abdullah Al-gohany +1 more
doaj +1 more source
Chaos-based cryptosystems have been an active area of research in recent years. Although these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems like Chebyshev polynomials can provide additional security when used with ...
Unsub Zia +6 more
semanticscholar +1 more source
Cryptanalysis of a computer cryptography scheme based on a filter bank [PDF]
This paper analyzes the security of a recently-proposed signal encryption scheme based on a filter bank. A very critical weakness of this new signal encryption procedure is exploited in order to successfully recover the associated secret key.Comment: 6 ...
Alvarez +14 more
core +3 more sources
Data Privacy in the Digital Era: Machine Learning Solutions for Confidentiality [PDF]
Data privacy has grown to be of utmost importance in today's digitally driven world. Protecting sensitive information has never been more important due to the explosion of data across many areas.
Dari Sukhvinder Singh +4 more
doaj +1 more source

