Zobrazeno 1 - 10
of 194
pro vyhledávání: '"Bok-Min Goi"'
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 1, Pp 159-165 (2023)
Traditional image encryption algorithms transform a plain image into a noise-like image. To lower the chances for the encrypted image being detected by the attacker during the image transmission, a visually meaningful image encryption scheme is sugge
Externí odkaz:
https://doaj.org/article/19794366856e4ff7bf0c32f8db23895c
Publikováno v:
IEEE Access, Vol 6, Pp 37991-38002 (2018)
With the advent of a telemedicine technology, many medical services can be provided remotely, which greatly enhances the welfare of our mankind. However, security and privacy of medical data transmitted through telecommunication systems remain a seri
Externí odkaz:
https://doaj.org/article/6b996463510f410f8caeeac2300ecadc
Publikováno v:
Symmetry, Vol 13, Iss 5, p 910 (2021)
Biometric template protection (BTP) schemes are implemented to increase public confidence in biometric systems regarding data privacy and security in recent years. The introduction of BTP has naturally incurred loss of information for security, which
Externí odkaz:
https://doaj.org/article/35e6af5737e7468a946bfeff9b681a38
Publikováno v:
Scientific Reports, Vol 11, Iss 1, Pp 1-1 (2021)
An amendment to this paper has been published and can be accessed via a link at the top of the paper.
Externí odkaz:
https://doaj.org/article/62e3a643e65b44bc8fac87f89014ce2a
Publikováno v:
Symmetry, Vol 11, Iss 2, p 164 (2019)
Iris has been found to be unique and consistent over time despite its random nature. Unprotected biometric (iris) template raises concerns in security and privacy, as numerous large-scale iris recognition projects have been deployed worldwide—for i
Externí odkaz:
https://doaj.org/article/de9f334fece947c0a6a89fcea707761d
Publikováno v:
IEEE Transactions on Information Forensics and Security. 18:3101-3115
Publikováno v:
Nonlinear Dynamics.
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 28:2672-2684
Postquantum cryptography attracts a lot of attention from the research community recently due to the emergence threat from quantum computer toward the conventional cryptographic schemes. In view of that, NIST had initiated the standardization process
Publikováno v:
IEEE Internet of Things Journal. 7:8513-8524
The key encapsulation mechanism (KEM) is an important cryptographic tool to protect communication in the Internet of Things (IoT). In the near future, classical algorithms used to construct KEMs, such as RSA and elliptic curve cryptography, will be v