Results 1 to 10 of about 46,565 (159)
Adaptively Secure Computationally Efficient Searchable Symmetric Encryption [PDF]
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as\ud possible to the server.
Doumen, J.M. +4 more
core +11 more sources
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification [PDF]
Cryptography is a cornerstone of power grid security, with the symmetry and asymmetry of cryptographic algorithms directly influencing the resilience of power systems against cyberattacks.
Jiakai Hao +3 more
doaj +3 more sources
Symmetric Public-Key Encryption [PDF]
Public-key encryption would seem to be inherently asymmetric. in that only messages sent to a user can be encrypted using his public key. We demonstrate that the use of interactive protocols for sending encrypted messages enables a symmetric use of ...
Galil, Zvi, Landau, Gad M., Yung, Moti
core +5 more sources
The hardware and software cryptographic information protection facility is one of the most important components of comprehensive information security in information and communication systems and computer networks.
Kairat Sakanuly Sakan +3 more
doaj +1 more source
Security of the data transmission in the industrial control system [PDF]
The theme of this paper is to present the data transmission security system between the stations of the industrial control system. The possible options for secure communications between process stations, as well as between process and operator station ...
Marcin Bednarek, Tadeusz Dąbrowski
doaj +1 more source
There are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this paper, we propose a compression-encryption model to solve these problems.
Emy Setyaningsih +2 more
doaj +1 more source
This research proposes the idea of double encryption, which is the combination of chaos synchronization of non-identical multi-fractional-order neural networks with multi-time-delays (FONNSMD) and symmetric encryption.
Fatin Nabila Abd Latiff +1 more
doaj +1 more source
Research on the searchable encryption
Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and ...
Peng XU, Hai JIN
doaj +3 more sources
Analytical Study of Hybrid Techniques for Image Encryption and Decryption
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
Chiranji Lal Chowdhary +5 more
doaj +1 more source
Proposal to Generate a Various Key from Image for Various Encryption Methods [PDF]
There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods have their own uses, advantages, and disadvantages.
Shatha Habeeb, Eman Shakeer
doaj +1 more source

