Results 1 to 10 of about 379,514 (140)
Private Key and Decoder Side Information for Secure and Private Source Coding [PDF]
We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction.
Onur Günlü +3 more
doaj +2 more sources
Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation [PDF]
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference ...
Shiming Fu, Tong Ling, Jun Yang, Yong Li
doaj +2 more sources
Small Private Key MQPKS on an Embedded Microprocessor [PDF]
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources.
Hwajeong Seo +5 more
doaj +2 more sources
Blockchain based system for transfer of funds through an e-Governance application [PDF]
In a democratic country where each and every person’s ideas matter in making decisions calls in the need for a distributed system. Also, transferring money from one system to another within seconds creates demand to be able to view it by each and every ...
Jansi Rani SELLA VELUSWAMI +3 more
doaj +1 more source
Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps
This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension private ...
Mua’ad Abu-Faraj +6 more
doaj +1 more source
Blockchain Technology – Support for Collaborative Systems [PDF]
Blockchain technology is one of the most promising new technology, a new approach in data registration and distribution, and represents a new paradigm for how information is shared.
Gheorghe MATEI
doaj +1 more source
Key-Private Proxy Re-encryption [PDF]
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as little trust and reveal as little information to the proxy as necessary to allow it to perform its translations. At the very least, the proxy should not be able to learn the keys
ATENIESE, GIUSEPPE +2 more
+7 more sources
In recent years, the Internet of Things (IoT) trend has been adopted very quickly. The rapid growth of IoT has increased the need for physical access control systems (ACS) for IoT devices, especially for IoT devices containing confidential data or other
Wervyan Shalannanda +7 more
doaj +1 more source
Blockchain Enabled Anonymous Privacy-Preserving Authentication Scheme for Internet of Health Things
The Internet of Health Things (IoHT) has emerged as an attractive networking paradigm in wireless communications, integrated devices and embedded system technologies.
Arun Sekar Rajasekaran +3 more
doaj +1 more source
Secure Secret Key and Private Key Generation in Source-Type Model With a Trusted Helper
Encrypting information with pre-agreed key is an effective method to ensure information security. With the increasing requirement for key rate, this paper investigates the problem of simultaneously generating a secret key (SK) and a private key (PK) over
Shixun Gong +4 more
doaj +1 more source

