Results 31 to 40 of about 3,071,363 (328)

Coalition Formation in a Legislative Voting Game [PDF]

open access: yes, 2013
We experimentally investigate the Jackson-Moselle (2002) model where legislators bargain over policy proposals and the allocation of private goods. Key comparative static predictions of the model hold as policy proposals shift in the predicted direction ...
Christiansen, N.   +2 more
core   +2 more sources

Improving the security of LSB image steganography

open access: yesJOIV: International Journal on Informatics Visualization, 2019
Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method.
Jamil Al-Azzeh   +3 more
doaj   +1 more source

Key management scheme with private key self-healing ability in DTN

open access: yes网络与信息安全学报, 2017
Because of the large delay of DTN network,node cannot receive broadcast updating private key messages in a timely manner,thus unable to update the private key for a certain time period.Aiming at this problem,an allowing private key self-healing ...
De-quan LI   +3 more
doaj   +3 more sources

Multi-dimensional key generation of ICMetrics for cloud computing [PDF]

open access: yes, 2015
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service.
Haciosman, Mustafa   +3 more
core   +2 more sources

Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures

open access: yesIET Information Security, 2021
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges.
Ferucio Laurenţiu Ţiplea   +1 more
doaj   +1 more source

Analysis of common attacks in LDPCC-based public-key cryptosystems [PDF]

open access: yes, 2003
We analyze the security and reliability of a recently proposed class of public-key cryptosystems against attacks by unauthorized parties who have acquired partial knowledge of one or more of the private key components and/or of the plaintext.
D. Saad   +17 more
core   +2 more sources

The secret key~private key capacity region for three terminals [PDF]

open access: yesProceedings. International Symposium on Information Theory, 2005. ISIT 2005., 2005
We consider a model for secrecy generation, with three terminals, by means of public interterminal communication, and examine the problem of characterizing all the rates at which all three terminals can generate a ``secret key,'' and -- simultaneously -- two designated terminals can generate a ``private key'' which is effectively concealed from the ...
Prakash Narayan, Ye Chunxuan
openaire   +3 more sources

New, efficient and robust, fiber-based quantum key distribution schemes [PDF]

open access: yes, 2002
We present a new fiber based quantum key distribution (QKD) scheme which can be regarded as a modification of an idea proposed by Inoue, Waks and Yamamoto (IWY) [1].
Bennett   +28 more
core   +2 more sources

Arabic Text Encryption Using Artificial Neural Networks [PDF]

open access: yesEngineering and Technology Journal, 2016
This research aims to build a cipher system using back propagation Algorithm with artificial neural network to encrypt any Arabic text and to prevent any data attack during the transition process.Encryption information holdsfour stages: 1)A neural ...
Oday Kamil Hamid
doaj   +1 more source

A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images

open access: yesJOIV: International Journal on Informatics Visualization, 2019
The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task.
Jamil Al-Azzeh, Ziad Alqadi, Qazem Jaber
doaj   +1 more source

Home - About - Disclaimer - Privacy