Results 11 to 20 of about 10,103,841 (323)
The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation [PDF]
The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated, in which each terminal observes a component of correlated sources.
Lai, Lifeng +3 more
core +3 more sources
A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure [PDF]
Higher security and lower failure probability have always been people’s pursuits in quantum-oblivious-key-transfer-based private query (QOKT-PQ) protocols since Jacobi et al. [Phys. Rev.
Chun‐Yan Wei +4 more
openalex +3 more sources
Blockchain based system for transfer of funds through an e-Governance application [PDF]
In a democratic country where each and every person’s ideas matter in making decisions calls in the need for a distributed system. Also, transferring money from one system to another within seconds creates demand to be able to view it by each and every ...
Jansi Rani SELLA VELUSWAMI +3 more
doaj +1 more source
A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography
Standard methods used in the encryption and decryption process are implemented to protect confidential data. These methods require many arithmetic and logical operations that negatively affect the performance of the encryption process.
M. Abu-faraj +2 more
semanticscholar +1 more source
In recent years, the Internet of Things (IoT) trend has been adopted very quickly. The rapid growth of IoT has increased the need for physical access control systems (ACS) for IoT devices, especially for IoT devices containing confidential data or other
Wervyan Shalannanda +7 more
doaj +1 more source
Blockchain Enabled Anonymous Privacy-Preserving Authentication Scheme for Internet of Health Things
The Internet of Health Things (IoHT) has emerged as an attractive networking paradigm in wireless communications, integrated devices and embedded system technologies.
Arun Sekar Rajasekaran +3 more
doaj +1 more source
This paper introduces a novel approach to enhance the efficiency of compressing Arabic Unicode text using the Lempel-Ziv-Welch (LZW) technique. This method includes two stages: transformation and compression.
Enas Abu Jrai +4 more
doaj +1 more source
Generalization of RSA cryptosystem based on 2n primes
This article introduced a new generalized RSA crypto-system based on $ 2n $ prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variable$ N $, where its analysis ...
Tariq Shah +4 more
doaj +1 more source
As blockchain is increasingly valued, the application of blockchain and its security has become a research hotspot. Not only that, more and more ordinary users are paying attention to the blockchain and beginning to trade commodities in cryptocurrencies.
Teng Hu +5 more
semanticscholar +1 more source
Private Key Recovery on Bitcoin with Duplicated Signatures
In the modern financial sector, interest in providing financial services that employ blockchain technology has increased. Blockchain technology is efficient and can operate without a trusted party to store all transaction information; additionally, it ...
Ju-Seong Ko, Jin Kwak
semanticscholar +1 more source

