Results 11 to 20 of about 10,103,841 (323)

The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation [PDF]

open access: yesIEEE Transactions on Information Theory, 2014
The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated, in which each terminal observes a component of correlated sources.
Lai, Lifeng   +3 more
core   +3 more sources

A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure [PDF]

open access: greenIEEE transactions on computers, 2017
Higher security and lower failure probability have always been people’s pursuits in quantum-oblivious-key-transfer-based private query (QOKT-PQ) protocols since Jacobi et al. [Phys. Rev.
Chun‐Yan Wei   +4 more
openalex   +3 more sources

Blockchain based system for transfer of funds through an e-Governance application [PDF]

open access: yesRevista Română de Informatică și Automatică, 2022
In a democratic country where each and every person’s ideas matter in making decisions calls in the need for a distributed system. Also, transferring money from one system to another within seconds creates demand to be able to view it by each and every ...
Jansi Rani SELLA VELUSWAMI   +3 more
doaj   +1 more source

A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography

open access: yesSymmetry, 2022
Standard methods used in the encryption and decryption process are implemented to protect confidential data. These methods require many arithmetic and logical operations that negatively affect the performance of the encryption process.
M. Abu-faraj   +2 more
semanticscholar   +1 more source

Smart Card-based Access Control System using Isolated Many-to-Many Authentication Scheme for Electric Vehicle Charging Stations

open access: yesJournal of ICT Research and Applications, 2023
In recent years, the Internet of Things (IoT) trend has been adopted very quickly. The rapid growth of IoT has increased the need for physical access control systems (ACS) for IoT devices, especially for IoT devices containing confidential data or other
Wervyan Shalannanda   +7 more
doaj   +1 more source

Blockchain Enabled Anonymous Privacy-Preserving Authentication Scheme for Internet of Health Things

open access: yesSensors, 2022
The Internet of Health Things (IoHT) has emerged as an attractive networking paradigm in wireless communications, integrated devices and embedded system technologies.
Arun Sekar Rajasekaran   +3 more
doaj   +1 more source

Improving LZW Compression of Unicode Arabic Text Using Multi-Level Encoding and a Variable-Length Phrase Code

open access: yesIEEE Access, 2023
This paper introduces a novel approach to enhance the efficiency of compressing Arabic Unicode text using the Lempel-Ziv-Welch (LZW) technique. This method includes two stages: transformation and compression.
Enas Abu Jrai   +4 more
doaj   +1 more source

Generalization of RSA cryptosystem based on 2n primes

open access: yesAIMS Mathematics, 2023
This article introduced a new generalized RSA crypto-system based on $ 2n $ prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variable$ N $, where its analysis ...
Tariq Shah   +4 more
doaj   +1 more source

Securing the Private Key in Your Blockchain Wallet: A Continuous Authentication Approach Based on Behavioral Biometric

open access: yesJournal of Physics: Conference Series, 2020
As blockchain is increasingly valued, the application of blockchain and its security has become a research hotspot. Not only that, more and more ordinary users are paying attention to the blockchain and beginning to trade commodities in cryptocurrencies.
Teng Hu   +5 more
semanticscholar   +1 more source

Private Key Recovery on Bitcoin with Duplicated Signatures

open access: yesKSII Transactions on Internet and Information Systems, 2020
In the modern financial sector, interest in providing financial services that employ blockchain technology has increased. Blockchain technology is efficient and can operate without a trusted party to store all transaction information; additionally, it ...
Ju-Seong Ko, Jin Kwak
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy