نتایج جستجو برای: simultaneous encryption

تعداد نتایج: 143810  

2016
Xingbin Liu Wenbo Mei Huiqian Du

In this paper, a novel approach based on compressive sensing and chaos is proposed for simultaneously compressing, fusing and encrypting multi-modal images. The sparsely represented source images are firstly measured with the key-controlled pseudo-random measurement matrix constructed using logistic map, which reduces the data to be processed and realizes the initial encryption. Then the obtain...

Journal: :I. J. Network Security 2012
Ayman Mousa Elsayed Nigm S. El-Rabaie Osama S. Faragallah

Encryption in database systems is an important topic for research, as secure and efficient algorithms are needed that provide the ability to query over encrypted database and allow optimized encryption and decryption of data. Clearly, there is a compromise between the degree of security provided by encryption and the efficient querying of the database, because the operations of encryption and d...

Journal: :IOSR Journal of Computer Engineering 2013

Journal: :Optics letters 2013
Eliot Bolduc Nicolas Bent Enrico Santamato Ebrahim Karimi Robert W Boyd

A phase-only hologram applies a modal transformation to an optical transverse spatial mode via phase encoding and intensity masking. Accurate control of the optical field crucially depends on the method employed to encode the hologram. In this Letter, we present a method to encode the amplitude and the phase of an optical field into a phase-only hologram, which allows the exact control of spati...

2017
Shoulin Yin Lin Teng Jie Liu

Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, and the other party with another key receives the ciphertext. Encryp...

Journal: :IACR Cryptology ePrint Archive 2007
Xianhui Lu Xuejia Lai Dake He Guomin Li

We propose a security notion named as weak adaptive chosen ciphertext security(INDWCCA) for hybrid encryption schemes. Although it is weaker than adaptive chosen ciphertext security(INDCCA), a IND-WCCA secure hybrid encryption scheme can be used in any situations that a IND-CCA secure hybrid encryption scheme used in. We show that IND-WCCA secure hybrid encryption scheme can be constructed from...

Journal: :International Journal of Computer Applications 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید