-
361
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01“…Cryptography serves as the cornerstone for safe communication and data security in today's digital environment. …”
Get full text
Article -
362
Honest Computing: achieving demonstrable data lineage and provenance for driving data and process-sensitive policies
Published 2024-01-01“…At its core, Honest Computing leverages Trustless Computing, Confidential Computing, Distributed Computing, Cryptography, and AAA security concepts. Honest Computing opens new ways of creating technology-based processes and workflows which permit the migration of regulatory frameworks for data protection from principle-based approaches to rule-based ones. …”
Get full text
Article -
363
Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain
Published 2019-09-01“…To overcome these limitations, we have proposed an efficient and secure heterogeneous scheme for body sensor networks, in which biosensor nodes use a certificate-less cryptography environment to resolve the key escrow and certificate-management problems, while MS uses a public key infrastructure environment to enhance the scalability of the networks. …”
Get full text
Article -
364
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01“…There were still limitations for anonymity, scrambling, or access control-based traditional privacy desensitization measures, cryptography-based measures, and federated learning-based measures, while privacy computing theory provided a computational and information system framework for full-lifecycle protection, which needed to be combined with different application scenarios to implement full-lifecycle privacy information protection.…”
Get full text
Article -
365
Research on power plant security issues monitoring and fault detection using attention based LSTM model
Published 2025-01-01“…Results The findings acquired from this evaluation are compared to the results received from existing detection approaches such as Cryptography, Intrusion Detection System (IDS) methods, and Network Defense Schemes. …”
Get full text
Article -
366
EPRNG: Effective Pseudo-Random Number Generator on the Internet of Vehicles Using Deep Convolution Generative Adversarial Network
Published 2025-01-01“…In the last decade, several cryptography-based protocols have been proposed as intuitive solutions to protect vehicles from information leakage and intrusions. …”
Get full text
Article -
367
Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks
Published 2024-12-01Get full text
Article -
368
One-sided device-independent random number generation through fiber channels
Published 2025-01-01“…Abstract Randomness is an essential resource and plays important roles in various applications ranging from cryptography to simulation of complex systems. Certified randomness from quantum process is ensured to have the element of privacy but usually relies on the device’s behavior. …”
Get full text
Article -
369
Application of Phi (<italic>Φ</italic>), the Golden Ratio, in Computing: A Systematic Review
Published 2025-01-01“…The review also categorizes findings by their specific applications and contexts, providing valuable insights into <inline-formula> <tex-math notation="LaTeX">$\phi $ </tex-math></inline-formula>’s impact on mathematics, cryptography, search algorithms, machine learning, artificial intelligence, photonics, natural sciences, system design, power engineering, robotics, and practical human life. …”
Get full text
Article -
370
STUDY OF COMPATIBILITY OF METHODS AND TECHNOLOGIES OF HIGH-LEVEL PROTOCOLS AND ERROR-CORRECTING CODES
Published 2024-12-01“…Enhanced encryption protocols such as IPsec and OpenVPN became widespread, supported by innovations in cryptography. Researchers like Hugo Krawczyk contributed to robust authentication mechanisms, such as the HMAC and IKEv2 protocols, ensuring the integrity and confidentiality of VPN tunnels. …”
Get full text
Article -
371
An Upper Bound for Locating Strings with High Probability Within Consecutive Bits of Pi
Published 2025-01-01“…This work has potential applications in Cryptography that use the number <inline-formula><math display="inline"><semantics><mi>π</mi></semantics></math></inline-formula> for random sequence generation, offering insights into the number of bits of <inline-formula><math display="inline"><semantics><mi>π</mi></semantics></math></inline-formula> required to ensure good randomness properties.…”
Get full text
Article -
372
A Survey of Differential Privacy Techniques for Federated Learning
Published 2025-01-01“…This paper comprehensively expounds the research status of differential privacy techniques based on the federated learning framework, first providing detailed introductions to federated learning and differential privacy technologies, and then summarizing the development status of two types of federated learning differential privacy(DPFL) techniques respectively; for CDPFL, the paper divides the discussion into first proposal of CDP and typical application examples, the impact of Gaussian mechanisms on model accuracy, optimization based on asynchronous differential privacy, and insights from other scholars; for LDPFL, the paper divides the discussion into first proposal of LDP and typical application examples, processing multidimensional data and improving model accuracy, existing methods and optimization for reducing communication costs, balancing privacy protection and data usability, LDPFL based on the Shuffle model, and insights from other scholars; following this, the paper addresses and summarizes the unique challenges introduced by incorporating differential privacy into federated learning and proposes solutions; finally, based on a summary of existing optimization techniques, the paper outlines future directions and specifically discusses three research ideas for enhancing the optimization effects of federated differential privacy: advanced optimization strategies combining Bayesian methods and the Alternating Direction Method of Multipliers (ADMM), integrating lattice homomorphic encryption techniques from cryptography to achieve more efficient differential privacy protection in federated learning, and exploring the application of zero-knowledge proof techniques in federated learning for privacy protection.…”
Get full text
Article -
373
Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)
Published 2024-01-01“…Hence, in this study, a symmetric encryption and decryption protocol was designed to ensure infosecurity of biosignals and medical images and assist in specific purposes in disease diagnosis. For a symmetric cryptography scheme, this study proposed a key generator combining a chaotic map and Bell inequality and generating unordered numbers and unrepeated 256 secret keys in the key space. …”
Get full text
Article -
374
Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…Data transmission will be insecure without a data security process. Cryptography is one of the options for securing data. …”
Get full text
Article -
375
Pengamanan Pesan E-Complaint Fasilitas dan Kinerja Civitas Akademika Menggunakan Algoritma RSA
Published 2022-12-01“…This study proposes the application of cryptography, which converts messages into code, so the actual message is not known. …”
Get full text
Article -
376
Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature
Published 2023-12-01“…Abstract This research studies how cryptography uses the Secure Hash Algorthm 256 (SHA-256) and Rivest Shamir Adleman (RSA) to maintain the authenticity of the Pass Certificate (SKL) using a web-based Quick Response (QR) code. …”
Get full text
Article -
377
Skema Kredibilitas Sertifikat Berbasis Ilearning Gamifikasi Blockchain pada Kampus Merdeka
Published 2023-02-01“…The primary purpose of this research is to apply Blockchain technology to increase the use of several encryption technologies authentication and decentralized data distribution for SHA256 data storage, namely the use of cryptography used in Blockchain. This research method uses the SDLC (System Development Life Cycle) method by building a system, and information collection is made through observation and questionnaires using Google Form. …”
Get full text
Article -
378
Single-Photon Detectors for Quantum Integrated Photonics
Published 2024-12-01“…Applications such as quantum key distribution, quantum cryptography, and quantum computation demand the ability to detect individual quanta of light and distinguish between single-photon states and multi-photon states, particularly when operating within waveguide systems. …”
Get full text
Article