17   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Tao Liu, Bin Yan and Jeng-Shyang Pan    
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc. Recently, researches have indicated that combini... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Djihed Anani,Kamel M. Faraoun     Pág. 94 - 103
In this paper, we present a new (t,n)-threshold secret images sharing scheme based on linear memory cellular automata (LMCA). While all existing LMCA-based sharing scheme are not robust, the proposed one provides full robustness property. Precisely, any ... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Alan Huang and Justie Su-Tzu Juan    
A personal camera fingerprint can be created from images in social media by using Photo Response Non-Uniformity (PRNU) noise, which is used to identify whether an unknown picture belongs to them. Social media has become ubiquitous in recent years and man... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Bimal Kumar Roy and Anandarup Roy    
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share th... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Agus Winarno and Riri Fitri Sari    
Personal data security is a cybersecurity trend that has captured the world?s attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is widely use... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yu-Hong Chen and Justie Su-Tzu Juan    
XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares. No information about the secret can be obtained from any o... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sakshi Chhabra,Ashutosh Kumar Singh     Pág. 296 - 307
Cloud Computing has achieved long dreamed vision of developments in IT industry such as remote storage services or privacy solutions. It is a data storage model in which data is preserved, controlled and presented over the network users. However, cloud s... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Anjaneyulu Endurthi,Oinam B. Chanu,Appala N. Tentu,V. Ch. Venkaiah     Pág. 15 - 24
Three secret sharing schemes that use the Mignotte?ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8]. The first s... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Tao Feng, Dewei Wang and Renbin Gong    
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ou Ruan, Changwang Yan, Jing Zhou and Chaohao Ai    
Multiparty Private Set Intersection (MPSI) is dedicated to finding the intersection of datasets of multiple participants without disclosing any other information. Although many MPSI protocols have been presented, there are still some important practical ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Soohyeon Choi and Dohoon Kim    
Illegally filmed images, the sharing of non-consensually filmed images over social media, and the secret recording and distribution of celebrity images are increasing. To catch distributors of illegally filmed images, many investigation techniques based ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Pin Wu, Xuting Chang, Yang Yang and Xiaoqiang Li    
Secret information sharing through image carriers has aroused much research attention in recent years with images? growing domination on the Internet and mobile applications. The technique of embedding secret information in images without being detected ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
William J. Buchanan, David Lanc, Elochukwu Ukwandu, Lu Fan, Gordon Russell and Owen Lo    
The Public Key Infrastructure (PKI) is crumbling, partially due to the lack of a strong understanding of how encryption actually works, but also due to weaknesses in its implementation. This paper outlines an Internet storage technique using secret shari... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Tianyu Bai, Song Fu and Qing Yang    
With the wider adoption of edge computing services, intelligent edge devices, and high-speed V2X communication, compute-intensive tasks for autonomous vehicles, such as object detection using camera, LiDAR, and/or radar data, can be partially offloaded t... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hayder Najm,Haider K. Hoomod,Rehab Hassan     Pág. pp. 184 - 199
The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of sharing data, instead of introducing all resources and connections involving computers, data, and people to the Web. It, therefore, focuses on a range of problems... ver más

 
en línea
Natasha Tanzila Monalisa,Shinthi Tasnim Himi,Nayeema Ferdous,Md. Ezharul Islam,Anup Majumder     Pág. pp. 97 - 112
Though in this modern society men and women are said to be given equal rights, having no gender discrimination, women are still considered weak and endlessly facing rape, domestic violence, eve-teasing, workplace violence, physical assault, cyberbullying... ver más

 
en línea
Kewei Ouyang, Yi Hou, Shilin Zhou and Ye Zhang    
Recently, some researchers adopted the convolutional neural network (CNN) for time series classification (TSC) and have achieved better performance than most hand-crafted methods in the University of California, Riverside (UCR) archive. The secret to the... ver más
Revista: Algorithms    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »