Results 111 to 120 of about 142,210 (279)

Privacy-Preserving Genetic Relatedness Test [PDF]

open access: yes, 2016
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano   +2 more
core   +1 more source

Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions

open access: yesMathematics
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj   +1 more source

Secure Hashing Algorithm And Advance Encryption Algorithm In Cloud Computing

open access: yes, 2017
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common
openaire   +2 more sources

Security of signed ELGamal encryption [PDF]

open access: yes, 2005
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core  

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits

open access: yes, 2015
Motivated by the problem of simultaneously preserving confidentiality and usability of data outsourced to third-party clouds, we present two different database encryption schemes that largely hide data but reveal enough information to support a wide ...
Basin D.   +8 more
core   +1 more source

Pydidas: a tool for automated X‐ray diffraction data analysis

open access: yesJournal of Applied Crystallography, EarlyView.
Pydidas is a new Python package for processing X‐ray diffraction data, offering a user‐friendly interface and versatile processing options. It includes a graphical user interface for the entire data processing pipeline and is intended to be easily accessible for non‐experts.The processing and analysis of X‐ray diffraction (XRD) data at synchrotrons is ...
Malte Storm   +2 more
wiley   +1 more source

Area integrity index with random rearrangement (AIIRR): A new concept for quantifying disruptive colorations

open access: yesMethods in Ecology and Evolution, EarlyView.
Abstract Disruptive coloration is one of the camouflaging strategies that use conspicuous coloration patterns to destroy the visual integrity of an object and interfere with the observer's visual perception. Such conspicuous coloration often divides the entire shape of the object into multiple areas, increasing the disruption effect. Here, we introduce
Masahiko Tanahashi   +2 more
wiley   +1 more source

Syrga2: Post-Quantum Hash-Based Signature Scheme

open access: yesComputation
This paper proposes a new post-quantum signature scheme, Syrga2, based on hash functions. As known, existing post-quantum algorithms are classified based on their structures.
Kunbolat Algazy   +3 more
doaj   +1 more source

A fast portable implementation of the Secure Hash Algorithm, III. [PDF]

open access: yes, 1992
In 1992, NIST announced a proposed standard for a collision-free hash function. The algorithm for producing the hash value is known as the Secure Hash Algorithm (SHA), and the standard using the algorithm in known as the Secure Hash Standard (SHS).
openaire   +3 more sources

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy