-
21
COLA-GLM: collaborative one-shot and lossless algorithms of generalized linear models for decentralized observational healthcare data
Published 2025-07-01“…We introduce the Collaborative One-shot Lossless Algorithm for Generalized Linear Models (COLA-GLM), a novel federated learning algorithm that supports diverse outcome types via generalized linear models and achieves results identical to a pooled patient-level data analysis (lossless) with only a single round of aggregated data exchange (one-shot). …”
Get full text
Article -
22
Entropy-Based Block Scrambling Image Encryption Using DES Structure and Chaotic Systems
Published 2019-01-01Get full text
Article -
23
HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS
Published 2021-12-01Get full text
Article -
24
-
25
A secure medical image encryption technique based on DNA cryptography with elliptic curves
Published 2025-06-01Get full text
Article -
26
Secure S-box construction with 1D chaotic maps and finite field theory for block cipher encryption
Published 2025-06-01Get full text
Article -
27
-
28
-
29
Enhancing privacy in clustering and data mining: A novel approach for sensitive data protection
Published 2025-01-01Get full text
Article -
30
-
31
-
32
THE IMPACT OF ECONOMIC COMPANY DATA THEFT
Published 2018-05-01“…In terms of preventing internal threats, solutions have powerful encryption algorithms that protect important business information, application control tools, device control, web control and mobile device management features to implement IT security policies. …”
Get full text
Article -
33
CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES
Published 2022-06-01“…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
Get full text
Article -
34
Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
Published 2022-07-01“…Kiasu-BC algorithm is an internal tweakable block cipher of authenticated encryption algorithm Kiasu as one of first-round candidates in the CAESAR competition.The precomputation complexity is reduced by utilizing the freedom of the tweak and the internal key restriction through the research on structural characteristics of Kiasu-BC algorithm based on AES-128 round function.Combined with the differential enumeration technique, a new 5-round meet-in-the-middle distinguisher was constructed to improve the meet-in-the-middle attack on 8-round Kiasu-BC algorithm.The improved attack requires the time complexity of 2<sup>114</sup>, the memory complexity of 2<sup>63</sup> and the data complexity of 2<sup>108</sup>.…”
Get full text
Article -
35
Construction and Application of Media Corpus Based on Big Data
Published 2021-01-01Get full text
Article -
36
Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving
Published 2017-03-01“…Theoretical estimates of time complexity of the bee colony algorithm are given as the key data. Besides, the problem solution is provided: to find the required smallest number of processors of the homogeneous parallel computing systems with distributed memory, and a uniform plan for the implementation of operators for them, for the cryptanalysis algorithm based on the constructed information-logical graph data-logical graph, and for the preset time. …”
Get full text
Article -
37
-
38
PrivItem2Vec: A privacy-preserving algorithm for top-N recommendation
Published 2021-12-01Get full text
Article -
39
Improved Private Data Protection Scheme for Blockchain Smart Contracts
Published 2023-01-01Get full text
Article -
40
The application of blockchain with a comparative approach and its impact on risk, flexibility and internal control evaluation
Published 2024-09-01“…In general, the use of blockchain can affect the following: Risk: Blockchain minimizes the possibility of changing and falsifying information by using strong encryption and security algorithms. Also, by using distributed technology, the reliability of data access and visibility increases. …”
Get full text
Article