Results 1 to 10 of about 46,565 (159)

Adaptively Secure Computationally Efficient Searchable Symmetric Encryption [PDF]

open access: yes2014 Twelfth Annual International Conference on Privacy, Security and Trust, 2009
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as\ud possible to the server.
Doumen, J.M.   +4 more
core   +11 more sources

Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification [PDF]

open access: yesPeerJ Computer Science
Cryptography is a cornerstone of power grid security, with the symmetry and asymmetry of cryptographic algorithms directly influencing the resilience of power systems against cyberattacks.
Jiakai Hao   +3 more
doaj   +3 more sources

Symmetric Public-Key Encryption [PDF]

open access: yes, 1985
Public-key encryption would seem to be inherently asymmetric. in that only messages sent to a user can be encrypted using his public key. We demonstrate that the use of interactive protocols for sending encrypted messages enables a symmetric use of ...
Galil, Zvi, Landau, Gad M., Yung, Moti
core   +5 more sources

Requirements for symmetric block encryption algorithms developed for software and hardware implementation

open access: yesВестник КазНУ. Серия математика, механика, информатика, 2021
The hardware and software cryptographic information protection facility is one of the most important components of comprehensive information security in information and communication systems and computer networks.
Kairat Sakanuly Sakan   +3 more
doaj   +1 more source

Security of the data transmission in the industrial control system [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2015
The theme of this paper is to present the data transmission security system between the stations of the industrial control system. The possible options for secure communications between process stations, as well as between process and operator station ...
Marcin Bednarek, Tadeusz Dąbrowski
doaj   +1 more source

Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution

open access: yesDigital Communications and Networks, 2020
There are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this paper, we propose a compression-encryption model to solve these problems.
Emy Setyaningsih   +2 more
doaj   +1 more source

Implementation of synchronization of multi-fractional-order of chaotic neural networks with a variety of multi-time-delays: Studying the effect of double encryption for text encryption.

open access: yesPLoS ONE, 2022
This research proposes the idea of double encryption, which is the combination of chaos synchronization of non-identical multi-fractional-order neural networks with multi-time-delays (FONNSMD) and symmetric encryption.
Fatin Nabila Abd Latiff   +1 more
doaj   +1 more source

Research on the searchable encryption

open access: yes网络与信息安全学报, 2016
Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and ...
Peng XU, Hai JIN
doaj   +3 more sources

Analytical Study of Hybrid Techniques for Image Encryption and Decryption

open access: yesSensors, 2020
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
Chiranji Lal Chowdhary   +5 more
doaj   +1 more source

Proposal to Generate a Various Key from Image for Various Encryption Methods [PDF]

open access: yesEngineering and Technology Journal, 2013
There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages.
Shatha Habeeb, Eman Shakeer
doaj   +1 more source

Home - About - Disclaimer - Privacy