Results 1 to 10 of about 10,103,841 (323)

Private Key and Decoder Side Information for Secure and Private Source Coding [PDF]

open access: yesEntropy, 2022
We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction.
Onur Günlü   +3 more
doaj   +2 more sources

Secure Secret Key and Private Key Generation in Source-Type Model With a Trusted Helper [PDF]

open access: goldIEEE Access, 2020
Encrypting information with pre-agreed key is an effective method to ensure information security. With the increasing requirement for key rate, this paper investigates the problem of simultaneously generating a secret key (SK) and a private key (PK) over
Shixun Gong   +4 more
doaj   +2 more sources

Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation [PDF]

open access: yesEntropy
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference ...
Shiming Fu, Tong Ling, Jun Yang, Yong Li
doaj   +2 more sources

Small Private Key MQPKS on an Embedded Microprocessor [PDF]

open access: yesSensors, 2014
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources.
Hwajeong Seo   +5 more
doaj   +2 more sources

Reminisce: Blockchain Private Key Generation and Recovery Using Distinctive Pictures-Based Personal Memory [PDF]

open access: goldMathematics, 2022
As a future game-changer in various industries, cryptocurrency is attracting people’s attention. Cryptocurrency is issued on blockchain and managed through a blockchain wallet application.
Jungwon Seo   +4 more
doaj   +2 more sources

Key management scheme with private key self-healing ability in DTN

open access: green网络与信息安全学报, 2017
Because of the large delay of DTN network,node cannot receive broadcast updating private key messages in a timely manner,thus unable to update the private key for a certain time period.Aiming at this problem,an allowing private key self-healing ...
De-quan LI   +3 more
doaj   +4 more sources

Public-Private Partnerships: Interorganizational Design as Key Success Factor

open access: diamondManagement, 2015
Public-Private Partnership (PPP), as a current topic in theory and practice, has mostly been treated from the perspective of legislation and recognized by classical macroeconomic paradigm.
Mirjana Petković   +2 more
doaj   +2 more sources

Private Key Extension of Polly Cracker Cryptosystems [PDF]

open access: greenComputer Science Journal of Moldova, 2008
In 1993 Koblitz and Fellows proposed a public key cryptosystem, Polly Cracker, based on the problem of solving multivariate systems of polynomial equations, which was soon generalized to a Dröbner basis formulation.
Nina Taslaman
doaj   +1 more source

Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps

open access: yesCryptography, 2023
This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension private ...
Mua’ad Abu-Faraj   +6 more
doaj   +1 more source

Blockchain Technology – Support for Collaborative Systems [PDF]

open access: yesInformatică economică, 2020
Blockchain technology is one of the most promising new technology, a new approach in data registration and distribution, and represents a new paradigm for how information is shared.
Gheorghe MATEI
doaj   +1 more source

Home - About - Disclaimer - Privacy