Results 41 to 50 of about 441,462 (365)

Order-Revealing Encryption and the Hardness of Private Learning [PDF]

open access: yes, 2015
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use order-revealing encryption to separate computationally efficient PAC learning
A Beimel   +27 more
core   +2 more sources

On the Optimality of Quantum Encryption Schemes

open access: yes, 2005
It is well known that n bits of entropy are necessary and sufficient to perfectly encrypt n bits (one-time pad). Even if we allow the encryption to be approximate, the amount of entropy needed doesn't asymptotically change.
Daniel Nagaj   +2 more
core   +1 more source

Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm

open access: yesComputers, 2019
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware, because it makes ...
S. H. Kok   +3 more
doaj   +1 more source

Malware command and control over social media: Towards the server-less infrastructure [PDF]

open access: yesSerbian Journal of Electrical Engineering, 2020
Intrusions into the computer systems are becoming increasingly sophisticated. Command and Control (C2) infrastructure, which enables attackers to remotely control infected devices, is a critical component. Malware is set to connect to C2 servers
Radunović Vladimir, Veinović Mladen
doaj   +1 more source

A New Image Encryption Algorithm for Grey and Color Medical Images

open access: yesIEEE Access, 2021
Recently, diagnosing diseases using medical images became crucial. As these images are transmitted through the network, they need a high level of protection. If the data in these images are liable for unauthorized usage, this may lead to severe problems.
Sara T. Kamal   +4 more
semanticscholar   +1 more source

The Myth of Superiority of American Encryption Products [PDF]

open access: yes, 1998
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now ...
Henry B. Wolfe
core  

IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security

open access: yesSecur. Commun. Networks, 2021
Wireless sensor networks (WSN) have problems such as limited power, weak computing power, poor communication ability, and vulnerability to attack. However, the existing encryption methods cannot effectively solve the above problems when applied to WSN ...
Chun Cao   +4 more
semanticscholar   +1 more source

Leveraging current insights on IL‐10‐producing dendritic cells for developing effective immunotherapeutic approaches

open access: yesFEBS Letters, EarlyView.
In vivo IL‐10 produced by tissue‐resident tolDC is involved in maintaining/inducing tolerance. Depending on the agent used for ex vivo tolDC generation, cells acquire common features but prime T cells towards anergy, FOXP3+ Tregs, or Tr1 cells according to the levels of IL‐10 produced. Ex vivo‐induced tolDC were administered to patients to re‐establish/
Konstantina Morali   +3 more
wiley   +1 more source

Entropy Analysis and Image Encryption Application Based on a New Chaotic System Crossing a Cylinder

open access: yesEntropy, 2019
Designing chaotic systems with specific features is a hot topic in nonlinear dynamics. In this study, a novel chaotic system is presented with a unique feature of crossing inside and outside of a cylinder repeatedly.
Alaa Kadhim Farhan   +4 more
doaj   +1 more source

A New Algorithm for Digital Image Encryption Based on Chaos Theory

open access: yesEntropy, 2021
In recent decades, image encryption, as one of the significant information security fields, has attracted many researchers and scientists. However, several studies have been performed with different methods, and novel and useful algorithms have been ...
Y. Pourasad   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy