Results 1 to 10 of about 48,518 (327)
Adaptively Secure Computationally Efficient Searchable Symmetric Encryption [PDF]
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as\ud possible to the server.
Doumen, J.M. +4 more
core +11 more sources
There are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this paper, we propose a compression-encryption model to solve these problems.
Emy Setyaningsih +2 more
doaj +3 more sources
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification [PDF]
Cryptography is a cornerstone of power grid security, with the symmetry and asymmetry of cryptographic algorithms directly influencing the resilience of power systems against cyberattacks.
Jiakai Hao +3 more
doaj +3 more sources
A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs. [PDF]
Shi Y, Wei W, He Z.
europepmc +3 more sources
Symmetric encryption for error correction
The article presents applying basis of symmetric encryption (block ciphering) in the area of coding theory, a specially in detecting and correcting errors of various types: bit inversion, insertion and skipping. For the case of bit inversion, it has been formulated the conditions of guaranteed fix for a given number of errors.
Nikolai Moldovyan +2 more
openalex +3 more sources
Symmetric encryption algorithms using chaotic and non-chaotic generators: A review [PDF]
Ahmed G Radwan +2 more
exaly +2 more sources
The hardware and software cryptographic information protection facility is one of the most important components of comprehensive information security in information and communication systems and computer networks.
Kairat Sakanuly Sakan +3 more
doaj +1 more source
Security of the data transmission in the industrial control system [PDF]
The theme of this paper is to present the data transmission security system between the stations of the industrial control system. The possible options for secure communications between process stations, as well as between process and operator station ...
Marcin Bednarek, Tadeusz Dąbrowski
doaj +1 more source
Research on the searchable encryption
Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and ...
Peng XU, Hai JIN
doaj +3 more sources
This research proposes the idea of double encryption, which is the combination of chaos synchronization of non-identical multi-fractional-order neural networks with multi-time-delays (FONNSMD) and symmetric encryption.
Fatin Nabila Abd Latiff +1 more
doaj +1 more source

