Results 81 to 90 of about 153,790 (328)

An Ecosystem to Develop Multi‐Agent Systems in Real‐World IoT Applications

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Software agents and multi‐agent systems are critical components in the development of distributed autonomous systems, as they exhibit a wide range of “intelligence,” from reactive behaviors to advanced reasoning and planning. Integrating these capabilities into multi‐agent systems enables distributed artificial intelligence, a programming ...
Davide Carnemolla   +3 more
wiley   +1 more source

Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]

open access: yesPeerJ Computer Science
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah   +2 more
doaj   +2 more sources

Robust Hashing Based on Quaternion Gyrator Transform for Image Authentication

open access: yesIEEE Access, 2020
Image hashing is one of the most effective methods in many image processing applications including image recognition or authentication, tampering detection, image retrieval, etc.
Junlin Ouyang, Xiao Zhang, Xingzi Wen
doaj   +1 more source

SIG-DB: leveraging homomorphic encryption to Securely Interrogate privately held Genomic DataBases

open access: yes, 2018
Genomic data are becoming increasingly valuable as we develop methods to utilize the information at scale and gain a greater understanding of how genetic information relates to biological function.
Flower, Audrey   +8 more
core   +2 more sources

Converting Binary Floating‐Point Numbers to Shortest Decimal Strings: An Experimental Review

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background When sharing or logging numerical data, we must convert binary floating‐point numbers into their decimal string representations. For example, the number π might become 3.1415927. Engineers have perfected many algorithms for producing such accurate, short strings.
Jaël Champagne Gareau, Daniel Lemire
wiley   +1 more source

Short signature based on factoring problem in the standard model

open access: yesTongxin xuebao, 2011
A short signature scheme based on factoring problem in the standard model was proposed.To design this sig-nature scheme,the generic construction of fully-secure signatures from weakly-secure signatures and a chameleon hash were employed.A signature in ...
WANG Zhi-wei1, ZHANG Wei1
doaj   +2 more sources

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits

open access: yes, 2015
Motivated by the problem of simultaneously preserving confidentiality and usability of data outsourced to third-party clouds, we present two different database encryption schemes that largely hide data but reveal enough information to support a wide ...
Basin D.   +8 more
core   +1 more source

Quantifying Structural Complexity, Effort, and Performance: An Early Experiment Using Network Design Tasks

open access: yesSystems Engineering, EarlyView.
ABSTRACT Structural Complexity is perceived as driving cost in system development, yet managing it effectively requires empirical understanding. This study investigates human decision‐making using a toy transportation‐style network design task, focusing on how Structural Complexity, Effort, and Performance interact. Seventy‐four participants (primarily
Alfonso Lanza   +3 more
wiley   +1 more source

High-Speed Privacy Amplification Algorithm Based on Two-Dimensional Cellular Automata in Quantum Key Distribution

open access: yesIEEE Photonics Journal
Privacy amplification is a critical component in quantum key distribution (QKD) to eliminate eavesdropper information and distill unconditionally secure keys.
Encheng Tian   +6 more
doaj   +1 more source

S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages

open access: yesEnergies, 2019
Standardized communication plays an important role in substation automation system (SAS). IEC 61850 is a de-facto standard in SAS. It facilitates smooth communication between different devices located in the substation by achieving interoperability ...
Shaik Mullapathi Farooq   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy