Results 31 to 40 of about 1,527 (301)

Certificateless public key cryptography based provable data possession scheme in edge environment

open access: yesTongxin xuebao, 2022
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the ...
Ziyuan WANG, Ruizhong DU
doaj   +2 more sources

Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness

open access: yesAdvanced Intelligent Systems, EarlyView.
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley   +1 more source

IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications

open access: yesIEEE Access, 2018
Searchable Encryption (SE) has been extensively examined by both academic and industry researchers. While many academic SE schemes show provable security, they usually expose some query information (e.g., search and access patterns) to achieve high ...
Guofeng Wang   +5 more
doaj   +1 more source

The Politics of Framing the Student Problem: Inquiries Into Australian Civics Education, 2006–2024

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT Recurring debates about civics, the kinds of history that should, and should not, be taught in school, and ‘standards debates’ about the ‘basics’ typically follow on the heels of recurring moral panics about the ‘declining’ state of ‘our’ education system.
Patrick O'Keeffe   +2 more
wiley   +1 more source

Stronger Security Variants of GCM-SIV

open access: yesIACR Transactions on Symmetric Cryptology, 2016
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme that remains secure even if the nonce is repeated.
Tetsu Iwata, Kazuhiko Minematsu
doaj   +1 more source

Integrated Evaluation of Contaminant Profiles, Detection Techniques, and Management Strategies for Tannery Sludge

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT This review article critically examines the environmental and health hazards of tannery sludge (TS), a complex by‐product of the leather tanning industry. TS is characterized by a diverse array of contaminants, including heavy metals like chromium, organic pollutants such as polycyclic aromatic hydrocarbons (PAHs), volatile organic compounds ...
Yashar Aryanfar   +10 more
wiley   +1 more source

Understanding international students' agency in developing employability: Case study of a post‐1992 university in the United Kingdom

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Employability remains a critical issue for international students in the United Kingdom. This study adopts the Employability Agency Framework proposed by Pham et al. to explore how a group of international students actively exercised their agency to enhance their employability during their Master's studies in the United Kingdom.
Hoang Nguyen, Ming Cheng
wiley   +1 more source

Security model for ID-based key exchange

open access: yesTongxin xuebao, 2010
The provable security of ID-based key exchange protocols was investigated. In the universally composable framework, the provable secure model of ID-based key exchange was proposed.
LIU Wen-ju1   +4 more
doaj   +2 more sources

Provable Secure Generalized Signcryption [PDF]

open access: yesJournal of Computers, 2010
Generalized signcryption which proposed by Han is a new cryptographic primitive which can work as an en- cryption scheme, a signature scheme or a signcryption scheme[5]. However,the security proof in their paper is uncorrect. our contribution are as following:First we give security notions for this new primitive.Secnond,we give an attack to [4] which ...
Xu an Wang, Xiaoyuan Yang, Jindan Zhang
openaire   +1 more source

EPN:encryption padding for NTRU with provable security

open access: yesTongxin xuebao, 2008
Known as the fastest public key cryptosystem available now,the provable security of NTRU has not been solved well.an encryption padding,called EPN was designed,for NTRU.Under the full domain one wayness assumption of NTRU,EPN had been proved ...
MU Ning-bo, HU Yu-pu, WANG Bao-cang
doaj   +2 more sources

Home - About - Disclaimer - Privacy