Results 231 to 240 of about 493,090 (289)
Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments. [PDF]
Lin HY, Chen PR.
europepmc +1 more source
SecuNet 4D a comprehensive framework for distributed SDN security and resilience. [PDF]
Badotra S, Gurusamy M.
europepmc +1 more source
A novel encrypted traffic detection model based on detachable convolutional GCN-LSTM. [PDF]
Yuan X, Wan J, An D, Pei H.
europepmc +1 more source
Federated Learning for a Dynamic Edge: A Modular and Resilient Approach. [PDF]
Almeida L +4 more
europepmc +1 more source
Research on Network Intrusion Detection Based on Weighted Histogram Algorithm for In-Vehicle Ethernet. [PDF]
Wang Y, Wu Y, Xu Y, Zhang K, Xu Y.
europepmc +1 more source
Quantum secured blockchain framework for enhancing post quantum data security. [PDF]
Reddy NR +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Randomized pseudo-probabilistic encryption algorithms
2017 XX IEEE International Conference on Soft Computing and Measurements (SCM), 2017The aim of the paper is providing resistance of the deniable encryption protocols to coercive attacks at which coercer has possibility to cause repeated encryption of the same input messages and/or to estimate the duration of the decryption procedure performed for disclosing the secret message.
P. I. Shapovalov +3 more
openaire +3 more sources
Chinese Physics B, 2021
Homomorphic encryption has giant advantages in the protection of privacy information. In this paper, we present a new kind of probabilistic quantum homomorphic encryption scheme for the universal quantum circuit evaluation. Firstly, the pre-shared non-maximally entangled states are utilized as auxiliary resources, which lower the requirements of the ...
Jing-Wen Zhang +3 more
openaire +3 more sources
Homomorphic encryption has giant advantages in the protection of privacy information. In this paper, we present a new kind of probabilistic quantum homomorphic encryption scheme for the universal quantum circuit evaluation. Firstly, the pre-shared non-maximally entangled states are utilized as auxiliary resources, which lower the requirements of the ...
Jing-Wen Zhang +3 more
openaire +3 more sources
A knapsack-based probabilistic encryption scheme
Knapsack-based cryptosystems had been viewed as the most attractive and the most promising asymmetric cryptographic algorithms for a long time due to their NP-completeness nature and high speed in encryption/decryption. Unfortunately, most of them are broken for the low-density feature of the underlying knapsack problems.
Baocang Wang, Qianhong Wu, Yupu Hu
openalex +3 more sources
The Probabilistic Encryption Algorithm Using Linear Transformation
2015The probabilistic encryption produces more than one ciphertext for the same plaintext. In this paper an attempt has been made to propose a probabilistic encryption algorithm based on simple linear transformation. The variable length sub key groups are generated using a random sequence.
K. Adi Narayana Reddy, B. Vishnuvardhan
openaire +3 more sources

