Results 61 to 70 of about 2,794 (176)

Towards an interpreter for efficient encrypted computation [PDF]

open access: yes, 2012
Fully homomorphic encryption (FHE) techniques are capable of performing encrypted computation on Boolean circuits, i.e., the user specifies encrypted inputs to the program, and the server computes on the encrypted inputs.
Devadas, Srinivas   +2 more
core   +2 more sources

Heatwaves on the Rise: The Role of El Niño‐Southern Oscillation and Local Water‐Energy Exchanges in Shaping Global Patterns

open access: yesJournal of Geophysical Research: Atmospheres, Volume 130, Issue 17, 16 September 2025.
Abstract Large‐scale and intense heatwaves pose significant risks to ecosystems and human society due to associated heat and water stress. Heatwaves can be classified as daytime, nighttime, and compound, depending on their occurrence time. However, the factors shaping global spatiotemporal patterns of heatwaves remain poorly understood, especially ...
Kun Zhang   +8 more
wiley   +1 more source

Klepto for Ring-LWE encryption [PDF]

open access: yes, 2018
Forensic image recognition tools are used by law enforcement agencies all over the world to automatically detect illegal images on confiscated equipment. This detection is commonly done with the help of a strictly confidential database consisting of hash
Xiao, D. (Dianyan), Yu, Y. (Yang)
core   +6 more sources

Quantum Computing in Industrial Internet of Things (IIoT) Forensics: Framework, Implications, Opportunities, and Future Directions

open access: yesWIREs Forensic Science, Volume 7, Issue 3, September 2025.
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley   +1 more source

Evaluation of Large Integer Multiplication Methods on Hardware [PDF]

open access: yes, 2017
Multipliers requiring large bit lengths have a major impact on the performance of many applications, such as cryptography, digital signal processing (DSP) and image processing.
Hanley, Neil   +2 more
core   +1 more source

Estimation of Coupled Ocean/Atmosphere Impacts to the Satellite Detection of Nocturnal Maritime Low Clouds

open access: yesGeophysical Research Letters, Volume 52, Issue 14, 28 July 2025.
Abstract Accurate observations of maritime low clouds are important for air and sea transportation, understanding boundary layer processes, and measuring Earth's radiation budget. The nighttime maritime low cloud extent is often determined in meteorological satellite imagery using the brightness‐temperature difference between the longwave infrared (e.g.
Jesse D. Turner   +6 more
wiley   +1 more source

A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 5, May 2025.
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma   +3 more
wiley   +1 more source

Protocolos para votaciones electrónicas [PDF]

open access: yes, 2017
Propuesta de protocolo para una prueba de conocimiento nulo para verificar el correcto funcionamiento de un nodo mixnet en un esquema de votación electrónica que utiliza un cifrado post-cuántico basado en retículos.
Martínez Pinilla, Ramiro
core  

Mode coupling by scattering in chiral nematic liquid crystal ring lasing [PDF]

open access: yes, 2019
Lasing in dye-doped chiral nematic liquid crystal can be realized with low pump energy and relatively high efficiency, thanks to the high reflectivity of the periodic structure.
Beeckman, Jeroen   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy