Results 51 to 60 of about 19,193 (189)

An adaptive block‐wise prediction error‐based (AdaBPE) reversible data hiding in encrypted images for medical image transmission

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 5, Page 1269-1290, October 2025.
Abstract Life expectancy has improved with new‐age technologies and advancements in the healthcare sector. Though artificial intelligence (AI) and the Internet of Things (IoT) are revolutionising smart healthcare systems, security of the healthcare data is always a concern.
Shaiju Panchikkil   +4 more
wiley   +1 more source

A Centralized Key Management Scheme Based on McEliece PKC for Space Network

open access: yesIEEE Access, 2020
Constrained by the limited resource, high-latency and high bit error rate, the existing group key management schemes for the space network are inefficient. To solve this problem, we proposed a centralized and identity-based key management scheme by using
Jie Liu   +4 more
doaj   +1 more source

A New "F-Lueg" Cryptosystem and its Security [PDF]

open access: yes, 2002
In this thesis, we present a new public-key cryptosystem and a new digital signature based on the extended Lucas function analogue to EIGamal cryptosystem. We name it" F-LUEG" cryptosystem. Chapter 2, we point out how an extended Lucas function can be
Choo, Mun Yoong
core  

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Enhancing Data Privacy and Trust in E‐Learning: A Blockchain‐Based Access Control Protocol for Cloud Educational Systems

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 18-20, 30 August 2025.
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud   +4 more
wiley   +1 more source

PERBANDINGAN ALGORITMA DALAM ENKRIPSI ANTARA CONVENTIONAL CRYPTOSYSTEMS DAN PUBLIC KEY CRYPTOSYSTEM [PDF]

open access: yes, 2002
Artikel ini menjelaskan tentang perbandingan dua algoritma enkripsi antara conventional cryptosystem dan public key ...
MUKODIM, DIDIN, UMINATI, NAELI
core  

Fair Public-Key Cryptosystems [PDF]

open access: yes, 2007
We show how to construct public-key cryptosystems that are fair, that is, strike a good balance, in a democratic country, between the needs of the Government and those of the Citizens. Fair public-key cryptosystems guarantee that: (1) the system cannot be misused by criminal organizations and (2) the Citizens mantarn exactly the same rights to privacy ...
openaire   +1 more source

Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology

open access: yesEngineering Reports, Volume 7, Issue 8, August 2025.
A privacy‐preserving and fraud‐detection‐enabled health insurance claim system has been proposed that addresses the dual challenges of privacy preservation and fraud detection in health insurance claims. The proposed model enables both patients and healthcare providers to submit claims securely, ensuring patient anonymity while effectively detecting ...
Md. Mazharul Islam   +4 more
wiley   +1 more source

McEliece public key cryptosystem attack algorithm based on enumeration error vector

open access: yesTongxin xuebao, 2014
The research on the security of McEliece (M) public key cryptosystem was presented. The Hamming weight of error vector is less than the code length, and M public key cryptosystem based on Goppa code possesses low weight public code words. Considering the
Jing-mei LIU   +3 more
doaj   +2 more sources

Cryptosystem Based on Induced Group Codes

open access: yesМоделирование и анализ информационных систем, 2016
The code C on a group G, induced by the code N on a subgroup H, has the property that for decoding the code C one can use the decoder for the code N.
V. M. Deundyak, Y. V. Kosolapov
doaj   +1 more source

Home - About - Disclaimer - Privacy