Zobrazeno 1 - 10
of 471
pro vyhledávání: '"Strong cryptography"'
Publikováno v:
Multimedia Tools and Applications. 81:559-587
A novel color image encryption algorithm based on the fractional order laser chaotic system and DNA mutation principle is proposed in this paper. Using phase diagram, Lyapunov exponential spectrum, bifurcation diagram and C0 complexity, the dynamic c
Autor:
Peter Foytik, Eranga Bandara, Nalin Ranasinghe, Sachin Shetty, Kasun De Zoysa, Deepak K. Tosh
Publikováno v:
Future Generation Computer Systems. 119:154-165
Internet of Things (IoT) platforms have been deployed in several domains to enhance efficiency of business process and improve productivity. Most IoT platforms comprise of heterogeneous software and hardware components which can potentially introduce
Autor:
Krishnashree Achuthan, Rajkumar Buyya, Pramod George Jose, Prabhakar Krishnan, Kurunandan Jain
Publikováno v:
ACM Transactions on Multimedia Computing, Communications, and Applications. 17:1-29
The technologies for real-time multimedia transmission and immersive 3D gaming applications are rapidly emerging, posing challenges in terms of performance, security, authentication, data privacy, and encoding. The communication channel for these mul
Publikováno v:
IEEE Access, Vol 9, Pp 52364-52377 (2021)
In this paper, a color image encryption algorithm based on the fractional-order multi-scroll Chen chaotic system and DNA mutation principle is proposed. The dynamical performances of the fractional-order multi-scroll Chen chaotic system are analyzed
Autor:
Ria Dwi I’zzaty
Publikováno v:
Conference Series. 2:15-21
Current technological developments greatly impact the assessment verification system. To find out the student benchmarks in the results of teaching and learning activities during the learning system assessment process is very important in the scope o
Publikováno v:
Angewandte Chemie. 132:8554-8558
Today, we can read human genomes and store digital data robustly in synthetic DNA. Here we report a strategy to intertwine these two technologies to enable the secure storage of valuable information in synthetic DNA, protected with personalized keys.
Publikováno v:
CCS
As organizations struggle with processing vast amounts of information, outsourcing sensitive data to third parties becomes a necessity. To protect the data, various cryptographic techniques are used in outsourced database systems to ensure data priva
Autor:
Luo Ping, Majid Mumtaz
Publikováno v:
Journal of Discrete Mathematical Sciences and Cryptography. 22:9-29
RSA public key cryptosystem is the de-facto standard use in worldwide technologies as a strong encryption/decryption and digital signature scheme. RSA successfully defended forty years of attack si...
Autor:
Hisham N. Almajed, Ahmad Almogren
Publikováno v:
IEEE Access, Vol 7, Pp 175865-175878 (2019)
Many applications use asymmetric cryptography to secure communications between two parties. One of the main issues with asymmetric cryptography is the need for vast amounts of computation and storage. While this may be true, elliptic curve cryptograp
Publikováno v:
IEEE Access, Vol 7, Pp 50031-50040 (2019)
Security enhancement is and always will be a prime concern for the deployment of point-of-interest (POI) recommendation services in mobile sensing environment. Recent tamper-proof technical protection such as strong encryption has undoubtedly become