Results 141 to 150 of about 153,790 (328)

Implementation and Evaluation of Parallel Computing Approaches for Large‐Domain, Process‐Based Hydrologic Simulations

open access: yesJournal of Advances in Modeling Earth Systems, Volume 18, Issue 1, January 2026.
Abstract Process‐based hydrologic simulations in large domains generally require intensive computing resources. In this study, we implement various parallelization approaches within a process‐based hydrologic solver, SUMMA, including the Message Passing Interface (MPI), Open Multi‐Processing (OMP), and the Actor Model, to enable high‐performance ...
Junwei Guo   +7 more
wiley   +1 more source

Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics

open access: yesiScience
Summary: This article proposes a secure communication enhancement scheme based on face detection and chaotic partition permutation. The scheme uses edge detection technology to detect facial information, which is then used as an encryption object.
Zhiyu Xie   +3 more
doaj   +1 more source

Design and Implementation of XGBoost‐Based Cyberattack Detection and Blockchain‐Enabled Charging Station

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley   +1 more source

A Robust Reversible Watermarking Algorithm Resistant to Geometric Attacks Based on Tchebichef Moments

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
This paper presents a robust reversible watermarking algorithm based on Chebyshev moments, employing a two‐stage embedding mechanism. The proposed method leverages image block partitioning to embed the copyright watermark and the reversible watermark into non‐overlapping regions located inside and outside the inscribed circle of the image, respectively.
Wenjing Sun, Ling Zhang, Hongjun Zhang
wiley   +1 more source

Secure Network using Secure Hash Algorithm-3 with Locking Protocol in Distributed Database System

open access: hybrid, 2017
Prerna Gupta   +45 more
openalex   +1 more source

Hyperchaos‐Driven 3D RGB Image Scrambling and Encryption for Multi‐Image Security

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
The proposed encryption scheme scrambles N colour images by stacking them into a three‐dimensional red, green, blue image, generating a secure 256‐bit key using SHA‐256 and a user‐provided salt, and applying a five‐dimensional multi‐wing hyperchaotic system to produce random key streams.
Muhammad Hanif   +6 more
wiley   +1 more source

Blockchain‐Enabled Privacy‐Preserving Access Control for EHRs Sharing With Optimized User and Attribute Revocation

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk   +2 more
wiley   +1 more source

(Not Surprising) Attacks on Recent Pairing‐Free Attribute‐Based Encryption Schemes

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
The fact that designing secure and efficient identity or attribute‐based encryption (ABE) schemes requires the use of specific algebraic tools like bilinear pairings or lattices is well known in the cryptographic community. However, some journals whose main topics are not cryptographic still publish papers proposing, for instance, ABE schemes in ...
Javier Herranz, Thomas Haines
wiley   +1 more source

Home - About - Disclaimer - Privacy