Results 21 to 30 of about 379,633 (259)

Key management scheme with private key self-healing ability in DTN

open access: yes网络与信息安全学报, 2017
Because of the large delay of DTN network,node cannot receive broadcast updating private key messages in a timely manner,thus unable to update the private key for a certain time period.Aiming at this problem,an allowing private key self-healing ...
De-quan LI   +3 more
doaj   +3 more sources

On distilling secure key from reducible private states and (non)existence of entangled key-undistillable states

open access: yesNew Journal of Physics, 2018
Hereunder, we study the class of irreducible private states that are private states from which all the secret content is accessible via measuring their key part.
K Horodecki   +3 more
doaj   +1 more source

Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

open access: yesIET Information Security, 2021
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea   +1 more
doaj   +1 more source

Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication

open access: yesIEEE Access, 2019
Encryption with shared key is one of the methods to ensure secure communication. To meet the requirements of keys, this paper investigates the problem of generating private key (PK) and group key (GK) using correlated sources and discrete memoryless ...
Shixun Gong   +3 more
doaj   +1 more source

Arabic Text Encryption Using Artificial Neural Networks [PDF]

open access: yesEngineering and Technology Journal, 2016
This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition process.Encryption information holdsfour stages: 1)A neural ...
Oday Kamil Hamid
doaj   +1 more source

A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images

open access: yesJOIV: International Journal on Informatics Visualization, 2019
The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task.
Jamil Al-Azzeh, Ziad Alqadi, Qazem Jaber
doaj   +1 more source

A new code‐based digital signature based on the McEliece cryptosystem

open access: yesIET Communications, 2023
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui   +2 more
doaj   +1 more source

Architecture and key technologies of 5G power private network

open access: yesDianxin kexue, 2022
Some main aspects of 5G power private network including network architecture, key technologies and the analysis on the existing key issues aiming to large-scale commercial use were intorduced.Firstly, the service characteristics of power grid was combed ...
Rong WANG   +4 more
doaj   +2 more sources

Efficient Quantum Private Comparison without Sharing a Key

open access: yesEntropy, 2023
Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics.
Jian Li, Fanting Che, Zhuo Wang, Anqi Fu
doaj   +1 more source

The HIT Network for Children and Adolescents With CNS Tumors Facilitates Improvements of Diagnostic Assessments, Multimodal Treatments, Individual Counseling, and Research in Germany, Austria, and Switzerland

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski   +59 more
wiley   +1 more source

Home - About - Disclaimer - Privacy