Encryption Techniques and Wireless Power Transfer Schemes
نویسندگان
چکیده
منابع مشابه
Browse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملWireless Power Transfer System
This paper presents a survey of recent wireless power transfer systems. The issue of wireless power transfer is to achieve a highly efficient system with small positioning errors of the facilities setting. Several theories have been presented to obtain precise system design. This paper presents a summary of design theory for short range power transfer systems and detailed formulations based on ...
متن کاملArtemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملWireless Transfer of Electric Power
In this dissertation, I describe the design and construction of a system which can transfer electric power wirelessly. This is accomplished using inductive, near-field, non-radiative coupling between self-resonant copper helices. In our first experiment, we transfered 60W of power over a distance of 2m with 45% efficiency. In our second experiment, we designed a system which can transfer power ...
متن کاملImage Encryption Techniques Using Chaotic Schemes: a Review
Cryptography is about communication in the presence of an adversary. It encompasses many problems like encryption, authentication, and key distribution to name a few. The field of modern cryptography provides a theoretical foundation based on which one can understand what exactly these problems are, how to evaluate protocols that purport to solve them and how to build protocols in whose securit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2018
ISSN: 2502-4760,2502-4752
DOI: 10.11591/ijeecs.v9.i1.pp183-190