8   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Yi-Fan Tseng, Zi-Yuan Liu and Raylin Tso    
Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively. Only if the attribute and predicate vectors satis... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Zhijun Wu, Yun Zhang and Enzhong Xu    
For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even the key, to solve many current problems. Named Dat... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer    
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio... ver más
Revista: Information    Formato: Electrónico

 
en línea
Dani Elias Mfungo, Xianping Fu, Xingyuan Wang and Yongjin Xian    
In today?s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines the Kronecker xor pr... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Abidemi Emmanuel Adeniyi, Sanjay Misra, Eniola Daniel and Anthony Bokolo, Jr.    
Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of collecting, stealin... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Tianqi Qiu, Xiaojin Liang, Qingyun Du, Fu Ren, Pengjie Lu and Chao Wu    
Emergency remote sensing mapping can provide support for decision making in disaster assessment or disaster relief, and therefore plays an important role in disaster response. Traditional emergency remote sensing mapping methods use decryption algorithms... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
????????? ???????? ?????     Pág. 5 - 14
The subject matter of the study is the encryption of information in cloud data computation and storage. Cloud technologies enable reducing the cost of IT infrastructure significantly and responding to changes in computing needs flexibly. In this case, th... ver más

 
en línea
Chen Yang, Yang Sun and Qianhong Wu    
Cloud storage is widely used by organizations due to its advantage of allowing universal access with low cost. Attribute-based encryption (ABE) is a kind of public key encryption suitable for cloud storage. The secret key of each user and the ciphertext ... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »