Results 11 to 20 of about 10,264,102 (368)

Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps

open access: yesCryptography, 2023
This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension private ...
Mua’ad Abu-Faraj   +6 more
doaj   +1 more source

Blockchain Technology – Support for Collaborative Systems [PDF]

open access: yesInformatică economică, 2020
Blockchain technology is one of the most promising new technology, a new approach in data registration and distribution, and represents a new paradigm for how information is shared.
Gheorghe MATEI
doaj   +1 more source

Blockchain based system for transfer of funds through an e-Governance application [PDF]

open access: yesRevista Română de Informatică și Automatică, 2022
In a democratic country where each and every person’s ideas matter in making decisions calls in the need for a distributed system. Also, transferring money from one system to another within seconds creates demand to be able to view it by each and every ...
Jansi Rani SELLA VELUSWAMI   +3 more
doaj   +1 more source

A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography

open access: yesSymmetry, 2022
Standard methods used in the encryption and decryption process are implemented to protect confidential data. These methods require many arithmetic and logical operations that negatively affect the performance of the encryption process.
M. Abu-faraj   +2 more
semanticscholar   +1 more source

Key-Private Proxy Re-encryption [PDF]

open access: yesProceedings. International Symposium on Information Theory, 2005. ISIT 2005., 2009
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as little trust and reveal as little information to the proxy as necessary to allow it to perform its translations. At the very least, the proxy should not be able to learn the keys
ATENIESE, GIUSEPPE   +2 more
  +7 more sources

Blockchain Enabled Anonymous Privacy-Preserving Authentication Scheme for Internet of Health Things

open access: yesSensors, 2022
The Internet of Health Things (IoHT) has emerged as an attractive networking paradigm in wireless communications, integrated devices and embedded system technologies.
Arun Sekar Rajasekaran   +3 more
doaj   +1 more source

Smart Card-based Access Control System using Isolated Many-to-Many Authentication Scheme for Electric Vehicle Charging Stations

open access: yesJournal of ICT Research and Applications, 2023
In recent years, the Internet of Things (IoT) trend has been adopted very quickly. The rapid growth of IoT has increased the need for physical access control systems (ACS) for IoT devices, especially for IoT devices containing confidential data or other
Wervyan Shalannanda   +7 more
doaj   +1 more source

Improving LZW Compression of Unicode Arabic Text Using Multi-Level Encoding and a Variable-Length Phrase Code

open access: yesIEEE Access, 2023
This paper introduces a novel approach to enhance the efficiency of compressing Arabic Unicode text using the Lempel-Ziv-Welch (LZW) technique. This method includes two stages: transformation and compression.
Enas Abu Jrai   +4 more
doaj   +1 more source

Generalization of RSA cryptosystem based on 2n primes

open access: yesAIMS Mathematics, 2023
This article introduced a new generalized RSA crypto-system based on $ 2n $ prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variable$ N $, where its analysis ...
Tariq Shah   +4 more
doaj   +1 more source

Service for Verification of Electronic Document’s Certificates

open access: yesЦифровая трансформация, 2023
The legislation of the Republic of Belarus currently establishes the same legal force for identical documents on paper and in electronic form, which have a mandatory requisite - an electronic digital signature.
I. O. Tolokh   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy