Results 1 to 10 of about 48,518 (327)

Adaptively Secure Computationally Efficient Searchable Symmetric Encryption [PDF]

open access: yes2014 Twelfth Annual International Conference on Privacy, Security and Trust, 2009
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as\ud possible to the server.
Doumen, J.M.   +4 more
core   +11 more sources

Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution

open access: yesDigital Communications and Networks, 2020
There are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this paper, we propose a compression-encryption model to solve these problems.
Emy Setyaningsih   +2 more
doaj   +3 more sources

Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification [PDF]

open access: yesPeerJ Computer Science
Cryptography is a cornerstone of power grid security, with the symmetry and asymmetry of cryptographic algorithms directly influencing the resilience of power systems against cyberattacks.
Jiakai Hao   +3 more
doaj   +3 more sources

Symmetric encryption for error correction

open access: green2017 20th Conference of Open Innovations Association (FRUCT), 2017
The article presents applying basis of symmetric encryption (block ciphering) in the area of coding theory, a specially in detecting and correcting errors of various types: bit inversion, insertion and skipping. For the case of bit inversion, it has been formulated the conditions of guaranteed fix for a given number of errors.
Nikolai Moldovyan   +2 more
openalex   +3 more sources

Symmetric encryption algorithms using chaotic and non-chaotic generators: A review [PDF]

open access: yesJournal of Advanced Research, 2016
Ahmed G Radwan   +2 more
exaly   +2 more sources

Requirements for symmetric block encryption algorithms developed for software and hardware implementation

open access: yesВестник КазНУ. Серия математика, механика, информатика, 2021
The hardware and software cryptographic information protection facility is one of the most important components of comprehensive information security in information and communication systems and computer networks.
Kairat Sakanuly Sakan   +3 more
doaj   +1 more source

Security of the data transmission in the industrial control system [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2015
The theme of this paper is to present the data transmission security system between the stations of the industrial control system. The possible options for secure communications between process stations, as well as between process and operator station ...
Marcin Bednarek, Tadeusz Dąbrowski
doaj   +1 more source

Research on the searchable encryption

open access: yes网络与信息安全学报, 2016
Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and ...
Peng XU, Hai JIN
doaj   +3 more sources

Implementation of synchronization of multi-fractional-order of chaotic neural networks with a variety of multi-time-delays: Studying the effect of double encryption for text encryption.

open access: yesPLoS ONE, 2022
This research proposes the idea of double encryption, which is the combination of chaos synchronization of non-identical multi-fractional-order neural networks with multi-time-delays (FONNSMD) and symmetric encryption.
Fatin Nabila Abd Latiff   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy