Showing 141 - 160 results of 176 for search '"Cryptography"', query time: 0.06s Refine Results
  1. 141

    Responsibility for administrative delicts within banking operations by M. Yu. Bukreev

    Published 2018-11-01
    “…The author names specific features that are inherent for administrative responsibility within banking operations, namely: small public harm is based on normative, factual and procedural grounds, has negative consequences for delinquency, is accompanied by public condemnation of delicts, does not involve cryptography. It has been concluded that administrative responsibility for delicts within banking operations is the application of enforcement action for a delinquent offender (an individual or a legal entity) for the violation of banking legislation by the National Bank of Ukraine that are stipulated by the relevant administrative and legal norm. …”
    Get full text
    Article
  2. 142

    Legal Certainty Regarding the Conversion of Land Certificates To An Electronic System Based On Security Principles by H Holla, Rafi Salhi, Clarissa Oktaviriya Prakoso

    Published 2024-11-01
    “…The benefits for the community from electronic certificates are that there is guaranteed legal certainty and it reduces land certificate disputes because the electronic certificate security system already uses encryption technology such as cryptography. KEYWORDS: Security Guarantee, Electronic Land Certificate…”
    Get full text
    Article
  3. 143

    Reusable and robust fuzzy extractor for CRS-dependent sources by Yucheng Ma, Peisong Shen, Xue Tian, Kewei Lv, Chi Chen

    Published 2025-01-01
    “…Our construction is built upon some well-studied cryptography, including a collision resistant hash function, a symmetric key encryption that keeps secure with respect to auxiliary input, a public key encryption and simulation-sound non-interactive zero-knowledge argument. …”
    Get full text
    Article
  4. 144

    Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments by Mohammed A. Aleisa

    Published 2025-01-01
    “…To enable privacy-preserving authentication, access control, and secure communication, the framework integrates blockchain technology with Zero Trust Architecture (ZTA) and post-quantum cryptography. A hybrid Reinforcement-Lattice Blockchain KeyGen for quantum-resilient key generation, Deep Q-Network Multi-Factor Secure Key (DQN-MFSK) for dynamic selection of keys, and Zero-Knowledge Proof for privacy-preserving signatures are employed to achieve secure IoT settings. …”
    Get full text
    Article
  5. 145

    RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks by Muhammad Tanveer, Saud Alhajaj Aldossari

    Published 2025-01-01
    “…This paper introduces a novel lightweight AM, called RAM-MEN that employs cryptography and physically unclonable functions (PUFs) to secure IoT-enabled MEC environments in the 6G era. …”
    Get full text
    Article
  6. 146

    The impact of digital technologies on the information potential of accounting (financial) statements. Part 2: Impact of digital platforms and models on transparency of corporate re... by M. T. Turmanov, T. M. Rogulenko

    Published 2022-09-01
    “…The use in the course of the study of general scientific methods of analysis and synthesis, as well as methods of logical comparison, reduction and selection of methodologically important facts of reality, made it possible to conclude that in legal terms, the electronic form of existence of objects, objects, processes is legitimized, and the digital form is a deep care into the virtual world through cryptography, the use of complex systems, encryption code and a limited number of participants. …”
    Get full text
    Article
  7. 147

    A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption by Muhammad Asif, Sayeda Wajiha, Sameh Askar, Hijaz Ahmad

    Published 2024-01-01
    “…Substitution boxes (S-boxes) play an important role in symmetric key cryptography because they add complexity and resist cryptanalysis, improving the overall security of encrypted data. …”
    Get full text
    Article
  8. 148

    Post quantum proxy signature scheme based on the multivariate public key cryptographic signature by Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen

    Published 2020-04-01
    “…Due to less proxy signature schemes in the post-quantum cryptography aspect, in this article, we investigate the proxy signature in the post-quantum setting so that it can resist against the potential attacks from the quantum adversaries. …”
    Get full text
    Article
  9. 149

    Quantum algorithms for enhanced educational technologies by Basil Hanafi, Mohammad Ali, Devyaani Singh

    Published 2025-01-01
    “…Modern quantum algorithms like Grover’s Algorithm and Quantum Annealing support various functionalities like rapidity in processing as well as instantaneous flexibility towards customization of learning resources for the students and proper optimization of the learning trail. Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
    Get full text
    Article
  10. 150

    Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation by Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal

    Published 2025-01-01
    “…Studies are also ongoing on post-quantum cryptography, although they require significant computational resources and are challenging to implement in Internet of Things (IoT) devices. …”
    Get full text
    Article
  11. 151

    Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors by J. Portilla, A. Otero, E. de la Torre, T. Riesgo, O. Stecklina, S. Peter, P. Langendörfer

    Published 2010-10-01
    “…In order to avoid dependencies on a compromised level of security, a WSN node with a microcontroller and a Field Programmable Gate Array (FPGA) is used along this work to implement a state-of-the art solution based on ECC (Elliptic Curve Cryptography). In this paper it is described how the reconfiguration possibilities of the system can be used to adapt ECC parameters in order to increase or reduce the security level depending on the application scenario or the energy budget. …”
    Get full text
    Article
  12. 152

    Legal Aspects of Telepathology by Christian Dierks

    Published 2000-01-01
    “…Generally speaking, the principles of minimum data exchange, anonymity, pseudonymity and cryptography must be established as a basis for all telepathology procedures. …”
    Get full text
    Article
  13. 153

    Quantum secure patient login credential system using blockchain for electronic health record sharing framework by M. Natarajan, A. Bharathi, C. Sai Varun, Shitharth Selvarajan

    Published 2025-02-01
    “…The proposed scheme has been included for block encryption with the symmetric and asymmetric cryptography algorithms with respect to the hospital server and patients. …”
    Get full text
    Article
  14. 154
  15. 155

    Testing the Strength of Chaotic Systems as Seeds in a Pseudo Random Bit Generator by Lazaros Moysis, Marcin Lawnik, Christos Volos, Murilo S. Baptista, Sotirios K. Goudos, George F. Fragulis

    Published 2025-01-01
    “…Chaotic random bit generators have become an integral part of chaotic cryptography and other data protection applications, where they are used as sources of deterministic randomness, to secure an information signal. …”
    Get full text
    Article
  16. 156

    A Pipelined Hardware Design of FNTT and INTT of CRYSTALS-Kyber PQC Algorithm by Muhammad Rashid, Omar S. Sonbul, Sajjad Shaukat Jamal, Amar Y. Jaffar, Azamat Kakhorov

    Published 2024-12-01
    “…Lattice-based post-quantum cryptography (PQC) algorithms demand number theoretic transform (NTT)-based polynomial multiplications. …”
    Get full text
    Article
  17. 157

    Integrating sustainability into cybersecurity: insights from machine learning based topic modeling by Krishnashree Achuthan, Sriram Sankaran, Swapnoneel Roy, Raghu Raman

    Published 2025-01-01
    “…Moreover, ensuring cybersecurity in these interconnected networks demands the use of technologies such as resource-intensive cryptography and advanced intrusion detection systems. …”
    Get full text
    Article
  18. 158

    SYNTHESIS METHODS OF ALGEBRAIC NORMAL FORM OF MANY-VALUED LOGIC FUNCTIONS by A. V. Sokolov, O. N. Zhdanov, O. A. Ayvazian

    Published 2016-03-01
    “…The rapid development of methods of error-correcting coding, cryptography, and signal synthesis theory based on the principles of many-valued logic determines the need for a more detailed study of the forms of representation of functions of many-valued logic. …”
    Get full text
    Article
  19. 159

    A SYNTHESIS METHOD OF BASIC TERNARY BENT-SQUARES BASED ON THE TRIAD SHIFT OPERATOR by O. N. Zhdanov, A. V. Sokolov

    Published 2017-05-01
    “…Practical application of advanced algebraic constructions in modern communication systems based on MC-CDMA (Multi Code Code Division Multiple Access) technology and in cryptography necessitates their further research. One of the most commonly used advanced algebraic construction is the binary bent-function having a uniform amplitude spectrum of the Walsh-Hadamard transform and, accordingly, having the maximal distance from the codewords of affine code. …”
    Get full text
    Article
  20. 160

    A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation by Abid Mahboob, Muhammad Asif, Muhammad Nadeem, Aysha Saleem, Sayed M. Eldin, Imran Siddique

    Published 2022-01-01
    “…In the new era of cryptography, Substitution Boxes (S-Boxes) are very important to raise confusion in cipher text and the security of encryption directly depends on the algebraic strength of S-box. …”
    Get full text
    Article