Results 1 to 10 of about 565,557 (301)
The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security.
Raza Imam +3 more
doaj +2 more sources
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications.
Shuhab Shamshad +4 more
doaj +2 more sources
Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography
On the basis of ghost imaging, this paper proposes a multiple-image encryption scheme combining public key cryptography and Hadamard basis pattern. In the encryption system, a plurality of light paths are set, and the Hadamard basis patterns are used for
Leihong Zhang +3 more
doaj +2 more sources
A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones [PDF]
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Zhaobin Li +4 more
doaj +2 more sources
Revocable identity‐based matchmaking encryption in the standard model
Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access policy for the other party.
Zhe Jiang +5 more
doaj +1 more source
Quantum cryptography: Public key distribution and coin tossing [PDF]
When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on
Charles H. Bennett, Gilles Brassard
semanticscholar +1 more source
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator.
Kunwar Singh +3 more
doaj +1 more source
On Multiple Encryption for Public-Key Cryptography
Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due to ...
Tudor Soroceanu +2 more
doaj +1 more source
Post-quantum cryptography-driven security framework for cloud computing
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima +3 more
doaj +1 more source

