Results 81 to 90 of about 46,684 (278)

A Layered Approach For Improved Cloud Storage Security And Protection Of Access Policy [PDF]

open access: yesE3S Web of Conferences
Information technology provides a service called cloud computing, which offers many beneficial functions. But there are a lot of problems and drawbacks with cloud computing, the most significant of which is the uncertainty and possible danger presented ...
Venkata Rama Lakshmi Gundala   +4 more
doaj   +1 more source

Photon Avalanching Nanoparticles: The Next Generation of Upconverting Nanomaterials?

open access: yesAdvanced Functional Materials, EarlyView.
This Perspective outlines the mechanistic foundations that enable photon‐avalanche (PA) behavior in lanthanide nanomaterials and contrasts them with emerging application spaces and forward‐looking design strategies. By bridging threshold engineering, energy‐transfer dynamics, and materials engineering, we provide a coherent roadmap for advancing the ...
Kimoon Lee   +7 more
wiley   +1 more source

A hybrid encryption approach for efficient and secure data transmission in IoT devices

open access: yesJournal of Engineering and Applied Science
Security is a crucial concern in the Internet of Things (IoT) ecosystem. Due to IoT devices' constrained processing and storage resources, providing reliable security solutions is challenging.
Limin Zhang, Li Wang
doaj   +1 more source

A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher

open access: yesJournal of King Saud University: Computer and Information Sciences, 2018
Image encryption is rapidly increased recently by the increasing use of the internet and communication media. Sharing important images over unsecured channels is liable for attacking and stealing. Encryption techniques are the suitable methods to protect
Ziad E. Dawahdeh   +2 more
doaj   +1 more source

Nonce-Based Symmetric Encryption [PDF]

open access: yes, 2004
Symmetric encryption schemes are usually formalized so as to make the encryption operation a probabilistic or state-dependent function e of the message M and the key K: the user supplies M and K and the encryption process does the rest, flipping coins or modifying internal state in order to produce a ciphertext C.
openaire   +1 more source

Clean Up Behind You ‐ Novel Patterning Approach for Solid Immersion Lenses

open access: yesAdvanced Functional Materials, EarlyView.
A focused ion beam (FIB) milling strategy enables rapid fabrication of solid immersion lenses (SILs) with smooth, debris‐free surfaces eliminating the need for post‐processing. The optimized pattern improves efficiency and surface quality. SILs containing NV centers are also investigated, confirming the technique's suitability for quantum and photonic ...
Aleksei Tsarapkin   +10 more
wiley   +1 more source

Shape‐Changing Multiphase Microparticles from Complex Liquid Crystal Emulsions

open access: yesAdvanced Functional Materials, EarlyView.
Liquid crystalline network (LCN) microparticles are prepared from single, double (Janus), and triple emulsions through a simple and scalable bulk‐emulsification strategy. Under heating, the particles exhibit robust, reversible, large‐amplitude deformations that depend both on the morphology and the liquid crystals director field configuration.
Marco Turriani   +3 more
wiley   +1 more source

ПРИМЕНЕНИЕ ЗАПУТЫВАЮЩИХ ПРЕОБРАЗОВАНИЙ В КРИПТОГРАФИИ

open access: yesБезопасность информационных технологий, 2009
The author considers various aspects of obfuscation technique towards white-box cryptography and its application for DRM solutions. This paper covers questions related with transforming symmetric encryption schemes into asymmetric and designing ...
Евгений Юрьевич Родионов
doaj  

CSI-based symmetric encryption end-to-end communication system [PDF]

open access: yesJournal of Hebei University of Science and Technology
To address the issue of information leakage caused by key theft during transmission, a symmetric encryption end-to-end communication system based on channel state information (CSI) was proposed.
Yongli AN   +3 more
doaj   +1 more source

Property Preserving Symmetric Encryption Revisited [PDF]

open access: yes, 2015
At EUROCRYPTi¾?2012 Pandey and Rouselakis introduced the notion of property preserving symmetric encryption which enables checking for a property on plaintexts by running a public test on the corresponding ciphertexts. Their primary contributions are: i a separation between 'find-then-guess' and 'left-or-right' security notions; ii a concrete ...
Sanjit Chatterjee, M. Prem Laxman Das
openaire   +1 more source

Home - About - Disclaimer - Privacy