Encryption Techniques and Wireless Power Transfer Schemes

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

Wireless Power Transfer System

This paper presents a survey of recent wireless power transfer systems. The issue of wireless power transfer is to achieve a highly efficient system with small positioning errors of the facilities setting. Several theories have been presented to obtain precise system design. This paper presents a summary of design theory for short range power transfer systems and detailed formulations based on ...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

Wireless Transfer of Electric Power

In this dissertation, I describe the design and construction of a system which can transfer electric power wirelessly. This is accomplished using inductive, near-field, non-radiative coupling between self-resonant copper helices. In our first experiment, we transfered 60W of power over a distance of 2m with 45% efficiency. In our second experiment, we designed a system which can transfer power ...

متن کامل

Image Encryption Techniques Using Chaotic Schemes: a Review

Cryptography is about communication in the presence of an adversary. It encompasses many problems like encryption, authentication, and key distribution to name a few. The field of modern cryptography provides a theoretical foundation based on which one can understand what exactly these problems are, how to evaluate protocols that purport to solve them and how to build protocols in whose securit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2018

ISSN: 2502-4760,2502-4752

DOI: 10.11591/ijeecs.v9.i1.pp183-190