Results 31 to 40 of about 1,527 (301)
Certificateless public key cryptography based provable data possession scheme in edge environment
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the ...
Ziyuan WANG, Ruizhong DU
doaj +2 more sources
Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley +1 more source
IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications
Searchable Encryption (SE) has been extensively examined by both academic and industry researchers. While many academic SE schemes show provable security, they usually expose some query information (e.g., search and access patterns) to achieve high ...
Guofeng Wang +5 more
doaj +1 more source
The Politics of Framing the Student Problem: Inquiries Into Australian Civics Education, 2006–2024
ABSTRACT Recurring debates about civics, the kinds of history that should, and should not, be taught in school, and ‘standards debates’ about the ‘basics’ typically follow on the heels of recurring moral panics about the ‘declining’ state of ‘our’ education system.
Patrick O'Keeffe +2 more
wiley +1 more source
Stronger Security Variants of GCM-SIV
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme that remains secure even if the nonce is repeated.
Tetsu Iwata, Kazuhiko Minematsu
doaj +1 more source
ABSTRACT This review article critically examines the environmental and health hazards of tannery sludge (TS), a complex by‐product of the leather tanning industry. TS is characterized by a diverse array of contaminants, including heavy metals like chromium, organic pollutants such as polycyclic aromatic hydrocarbons (PAHs), volatile organic compounds ...
Yashar Aryanfar +10 more
wiley +1 more source
Abstract Employability remains a critical issue for international students in the United Kingdom. This study adopts the Employability Agency Framework proposed by Pham et al. to explore how a group of international students actively exercised their agency to enhance their employability during their Master's studies in the United Kingdom.
Hoang Nguyen, Ming Cheng
wiley +1 more source
Security model for ID-based key exchange
The provable security of ID-based key exchange protocols was investigated. In the universally composable framework, the provable secure model of ID-based key exchange was proposed.
LIU Wen-ju1 +4 more
doaj +2 more sources
Provable Secure Generalized Signcryption [PDF]
Generalized signcryption which proposed by Han is a new cryptographic primitive which can work as an en- cryption scheme, a signature scheme or a signcryption scheme[5]. However,the security proof in their paper is uncorrect. our contribution are as following:First we give security notions for this new primitive.Secnond,we give an attack to [4] which ...
Xu an Wang, Xiaoyuan Yang, Jindan Zhang
openaire +1 more source
EPN:encryption padding for NTRU with provable security
Known as the fastest public key cryptosystem available now,the provable security of NTRU has not been solved well.an encryption padding,called EPN was designed,for NTRU.Under the full domain one wayness assumption of NTRU,EPN had been proved ...
MU Ning-bo, HU Yu-pu, WANG Bao-cang
doaj +2 more sources

