Zobrazeno 1 - 10
of 1 030
pro vyhledávání: '"Hybrid cryptosystem"'
Publikováno v:
IEEE Access, Vol 8, Pp 13898-13914 (2020)
With mobile payments popular around the world, payers can conduct a payment anytime and anywhere. While providing great convenience, mobile payment also brings many payment security issues. This paper is the first comprehensive review of secure mobil
Externí odkaz:
https://doaj.org/article/d893226f76d7403b8d11cb707acc92fa
Autor:
Musa Midila Ahmed
Publikováno v:
International Journal of Innovative Computing. 11:1-6
Internet of Things (IOT) is an essential paradigm where devices are interconnected into network. The operations of these devices can be through service-oriented software engineering (SOSE) principles for efficient service provision. SOSE is an import
Publikováno v:
Multidimensional Systems and Signal Processing. 33:181-221
In this paper, a novel hybrid 3D Video (3DV) encryption framework based on the Rubik's cube is suggested to attain simultaneous encryption of a group of 3DV frames. The suggested hybrid encryption framework begins with chaotic Baker map permutation,
Autor:
Tae Ho Cho, Won Jin Chung
Publikováno v:
International Journal of Advanced Technology and Engineering Exploration. 8:945-956
Autor:
Lokendra Vishwakarma, Debasis Das
Publikováno v:
Journal of Parallel and Distributed Computing. 154:94-105
The Internet of Things (IoT) becomes a leading field of computer science, which simplifies the life of human beings. The IoT, devices can interconnect and communicate with each other, in a fully autonomous mode. This autonomy has made the IoT network
Publikováno v:
IEEE Transactions on Control Systems Technology. 29:1704-1720
Recently, the security of state estimation has attracted significant research attention due to the need for trustworthy situation awareness in emerging cyber-physical systems. In this article, we design an encryption-based state estimation (ESE) usin
Autor:
Е.А. Tolomanenko, L.K. Babenko
Publikováno v:
IZVESTIYA SFedU. ENGINEERING SCIENCES. :6-18
Publikováno v:
Peer-to-Peer Networking and Applications. 14:3488-3501
Attribute-based encryption (ABE) provides a fine-grained access control mode for multiuser network environments. The popularity of 5th generation (5G) mobile network applications has greatly increased the data transmission rate, but mobile terminal d
Publikováno v:
International Journal on Cybernetics & Informatics. 10:225-231
E-voting system based on and improved from our previous work .E-voting system, referred to as Enhanced note is enhanced with a new protocol design and watchdog hardware device to ensure voter confidentiality and voting accuracy. The watchdog device r
Publikováno v:
Journal of University of Shanghai for Science and Technology. 23:77-84
Cloud Computing is used to share data, services, and resources via a network but this system is vulnerable to cyber-attacks by an unauthorized person denying the user privacy and confidentiality. The exponential growth in Information technology espec