نتایج جستجو برای: simultaneous encryption
تعداد نتایج: 143810 فیلتر نتایج به سال:
With the rise of technologies VR technology, AR and 3D printing, application models has become more extensive. The data model is floating point a unique storage format, traditional 2D image encryption algorithms are unsuitable for models. Therefore, based on 1D Sine-Map-Coupling-Logistic-Map (1D-SMCLM), algorithm designed in this paper. 1D-SMCLM new chaotic system with large parameter space goo...
Encryption provides strong security for databases. To develop a database encryption strategy, many factors must be taken into consideration. Organizations must balance between the requirement for security and the desire for excellent performance. In this paper a novel encryption algorithm is proposed “Reverse Encryption Algorithm (REA)”. The proposed algorithm REA is simple and yet leads to a c...
Omnipresence of security in every application in Internet application is a clear motivation to contribute in the field of Information Security. Security is one of the most challenging aspects in the internet and network applications. Encryption is a process which is used to secure the data and the Encryption algorithms play a crucial role in efficient information security systems. Full encrypti...
Predicate encryption is a recent generalization of identitybased encryption (IBE), broadcast encryption, attribute-based encryption, and more. A natural question is whether there exist black-box constructions of predicate encryption based on generic building blocks, e.g., trapdoor permutations. Boneh et al. (FOCS 2008) recently gave a negative answer for the specific case of IBE. We show both n...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید