نتایج جستجو برای: encryption

تعداد نتایج: 27368  

Journal: :J. Inf. Sci. Eng. 2014
Yang Lu Jiguo Li

Certificate-based encryption is a useful primitive that combines traditional public key encryption and identity-based encryption while preserving some of their most attractive features. It not only simplifies the cumbersome certificate management in traditional PKI, but also solves the key escrow problem inherent in identity-based encryption. In this paper, we propose a new certificate-based en...

2015
Mohammed Belkaid Lahdir Mourad

Satellite image Security is playing a vital role in the field of communication system and Internet. This work is interested in securing transmission of Meteosat images on the Internet, in public or local networks. To enhance the security of Meteosat transmission in network communication, a hybrid encryption algorithm based on Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) al...

2013
Rajinder Kaur

Due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication and storage of images. Image security has found a great need in many applications where the information (in the form of image) is to be protected from unauthorized access. Encryption is one of the ways to ensure high security. In recent years, encryption technology h...

2017
Carlo Brunetta Christos Dimitrakakis Bei Liang Aikaterini Mitrokotsa

Encrypting data with a semantically secure cryptosystem guarantees that nothing is learned about the plaintext from the ciphertext. However, querying a database about individuals or requesting for summary statistics can leak information. Differential privacy (DP) offers a formal framework to bound the amount of information that an adversary can discover from a database with private data, when s...

Journal: :JIPS 2012
Kun Peng

PVSS stands for publicly verifiable secret sharing. In PVSS, a dealer shares a secret among multiple share holders. He encrypts the shares using the shareholders' encryption algorithms and publicly proves that the encrypted shares are valid. Most of the existing PVSS schemes do not employ an ElGamal encryption to encrypt the shares. Instead, they usually employ other encryption algorithms like ...

Journal: :International Journal of Computer and Electrical Engineering 2010

Journal: :International Journal of Engineering Research and Advanced Technology 2019

2015
Xiangjun Wu Yang Li Jürgen Kurths

The chaos-based image cryptosystems have been widely investigated in recent years to provide real-time encryption and transmission. In this paper, a novel color image encryption algorithm by using coupled-map lattices (CML) and a fractional-order chaotic system is proposed to enhance the security and robustness of the encryption algorithms with a permutation-diffusion structure. To make the enc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید