Zobrazeno 1 - 10
of 971
pro vyhledávání: '"Encryption scheme"'
Autor:
Sehrish Aqeel, Sajid Ullah Khan, Adnan Shahid Khan, Meshal Alharbi, Sajid Shah, Mohammed EL Affendi, Naveed Ahmad
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-19 (2024)
Abstract With the urge to secure and protect digital assets, there is a need to emphasize the immediacy of taking measures to ensure robust security due to the enhancement of cyber security. Different advanced methods, like encryption schemes, are vu
Externí odkaz:
https://doaj.org/article/58306128d0be493faf330b97e970e74b
Publikováno v:
International Journal of Interactive Multimedia and Artificial Intelligence, Vol 8, Iss 2, Pp 150-157 (2023)
In the modern era, Cloud Platforms are the most needed port to maintain documents remotely with proper security norms. The concept of cloud environments is similar to the network channel. Still, the Cloud is considered the refined form of network, in
Externí odkaz:
https://doaj.org/article/093d77c74e5644a5a915ff51e13c7f6e
Autor:
Ahamd Khader Habboush, Bassam Mohammed Elzaghmouri, Binod Kumar Pattanayak, Saumendra Pattnaik, Rami Ahmad Habboush
Publikováno v:
Tikrit Journal of Engineering Sciences, Vol 30, Iss 4 (2023)
The Internet of Things (IoT) technology has recently emerged as a potential global communication medium that efficiently facilitates human-to-human, human-to-machine, and machine-to-machine communications. Most importantly, unlike the traditional Int
Externí odkaz:
https://doaj.org/article/80eedf4a3a0f4c1193a9f83f5701dd0b
Autor:
Sagarika Behera, Jhansi Rani Prathuri
Publikováno v:
Cryptography, Vol 8, Iss 1, p 8 (2024)
The suggested solution in this work makes use of the parallel processing capability of FPGA to enhance the efficiency of the K-Nearest Neighbor (KNN) algorithm on encrypted data. The suggested technique was assessed utilizing the breast cancer datase
Externí odkaz:
https://doaj.org/article/5202aa897994408389575d5db7b855da
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Boris Ryabko
Publikováno v:
Entropy, Vol 25, Iss 10, p 1406 (2023)
We consider the problem of constructing an unconditionally secure cipher with a short key for the case where the probability distribution of encrypted messages is unknown. Note that unconditional security means that an adversary with no computational
Externí odkaz:
https://doaj.org/article/fb4c9f3279ff405a9828619c5a090a38
Autor:
Yu ZHANG, Hailiang LI
Publikováno v:
网络与信息安全学报, Vol 7, Pp 40-48 (2021)
Adversarial attack is an important part of deep learning security research.Relying on the RSA signature schemes and RSA encryption schemes in cryptography, an adversarial attack method that adversarial examples can be recognized by a specific classif
Externí odkaz:
https://doaj.org/article/873db49d389241d5b648a8bc5b4bda96
Autor:
ZHANG Yu, LI Hailiang
Publikováno v:
网络与信息安全学报, Vol 7, Iss 5, Pp 40-48 (2021)
Adversarial attack is an important part of deep learning security research. Relying on the RSA signature schemes and RSA encryption schemes in cryptography, an adversarial attack method that adversarial examples can be recognized by a specific classi
Externí odkaz:
https://doaj.org/article/620059229f474e91b23343907f5aafa1
Autor:
Olayiwola Babarinsa, Olalekan Ihinkalu, Veronica Cyril-Okeme, Hailiza Kamarulhaili, Arif Mandangan, Azfi Zaidi Mohammad Sofi, Akeem B. Disu
Publikováno v:
Journal of Nigerian Society of Physical Sciences, Vol 4, Iss 4 (2022)
Goldreich-Goldwasser-Halevi (GGH) encryption scheme is lattice-based cryptography with its security based on the shortest vector problem (SVP) and closest vector problem (CVP) with immunity to almost all attacks, including Shor's quantum algorithm an
Externí odkaz:
https://doaj.org/article/068a687c61674db5836529b9ca1b2e88