Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Mee Loong Yang"'
Publikováno v:
Future Internet, Vol 16, Iss 8, p 271 (2024)
Mobile devices (MDs) are used by mobile cloud computing (MCC) customers and by other users because of their portability, robust connectivity, and ability to house and operate third-party applications (apps). However, the apps installed on an MD may p
Externí odkaz:
https://doaj.org/article/b14c7b21be74467790ec9e1b5c366a6e
Publikováno v:
Journal of Computer Networks and Communications, Vol 2022 (2022)
Attacks on cloud computing (CC) services and infrastructure have raised concerns about the efficacy of data protection mechanisms in this environment. The framework developed in this study (CCAID: cloud computing, attack, and intrusion detection) aim
Externí odkaz:
https://doaj.org/article/f524fa47f4b04b829b5fcb9913f13ce6
Publikováno v:
Journal of Sensor and Actuator Networks, Vol 3, Iss 3, Pp 181-206 (2014)
We propose a new authenticated key agreement scheme based on Blom’s scheme, but using multiple master keys and public keys in permutations to compute the private keys in each node. The computations are over a small prime field, and by storing them
Externí odkaz:
https://doaj.org/article/d01aaa7f4f304483bdf5c22d96839a10
Publikováno v:
Journal of Computer Networks and Communications.
Attacks on cloud computing (CC) services and infrastructure have raised concerns about the efficacy of data protection mechanisms in this environment. The framework developed in this study (CCAID: cloud computing, attack, and intrusion detection) aim
In this chapter, the authors propose an improved image encryption algorithm based on digital watermarking. The algorithm combines discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) together in a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::353fa9edac490d8420b2b5574aa667ab
https://doi.org/10.4018/978-1-7998-7705-9.ch016
https://doi.org/10.4018/978-1-7998-7705-9.ch016
Publikováno v:
2018 4th International Conference on Control, Automation and Robotics (ICCAR).
In digital image processing, filtering noise to reconstruct a high quality image is an important work for further image processing such as object segmentation, detection, recognition and tracking, etc. In this paper, we will use a CNN model in deep l
Publikováno v:
IVCNZ
In this paper, we propose an improved image encryption algorithm based on double random phase encoding (DRPE). Our contribution is the design of a new algorithm which uses Discrete Cosine Transform (DCT) to replace Discrete Fourier Transform (DFT) so
Publikováno v:
RFID-TA
Proximity Integrated Circuit Cards (PICC) are widely used for public transport fare collection. The stored contents in the card can only be accessed or modified after the card is able to authenticate the Proximity Coupling Device (PCD) or reader usin
Publikováno v:
2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
We proposed an identity-based symmetric key authentication protocol using the Multiple-Key Blom's key agreement scheme as the underlying cryptographic system. This scheme enables a pair of nodes to compute a secret pairwise key using each other's ide
Publikováno v:
ICT Systems Security and Privacy Protection ISBN: 9783642554148
SEC
SEC
The security of the Multiple-Key Blom’s (MKB) key agreement scheme is analysed. We considered how the scheme may be broken by a very powerful and well resourced adversary who is able to capture any number of nodes to extract all the sensitive keyin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::65807567a2b166c64a7e87aae3e66a38
https://doi.org/10.1007/978-3-642-55415-5_6
https://doi.org/10.1007/978-3-642-55415-5_6