Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 65
1.
  • Medical image encryption ba... Medical image encryption based on improved ElGamal encryption technique
    Laiphrakpam, Dolendro Singh; Khumanthem, Manglem Singh Optik (Stuttgart), 10/2017, Letnik: 147
    Journal Article
    Recenzirano

    Elliptic curve analogue ElGamal encryption scheme requires encoding of the plain message onto elliptic curve coordinate using Koblitz encoding technique before encryption operation. The paper ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
2.
  • Color image encryption base... Color image encryption based on chaotic systems and elliptic curve ElGamal scheme
    Wu, Jiahui; Liao, Xiaofeng; Yang, Bo Signal processing, December 2017, 2017-12-00, Letnik: 141
    Journal Article
    Recenzirano

    Color image can provide more information than gray image, so it is used more widely in the field of the communication. In recent years, how to safely encrypt images has received increasing attention. ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
3.
  • Stability-guaranteed dynami... Stability-guaranteed dynamic ElGamal cryptosystem for encrypted control systems
    Teranishi, Kaoru; Shimada, Naoki; Kogiso, Kiminao IET control theory & applications, 11/2020, Letnik: 14, Številka: 16
    Journal Article
    Recenzirano
    Odprti dostop

    Despite the importance of cyber-security for networked control systems, no suitable cryptosystem exists for networked control systems that guarantees stability and has low computational complexity. ...
Celotno besedilo
Dostopno za: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK

PDF
4.
  • Secure Reputation-Based Aut... Secure Reputation-Based Authentication With Malicious Detection in VANETs
    Yang, Xu; Zhu, Fei; Yang, Xuechao ... IEEE transactions on dependable and secure computing, 2024
    Journal Article

    Reputation-based authentication is a mechanism used to establish trust and ensure the reliability of vehicle communication in vehicular ad hoc networks (VANETs). However, existing schemes ignore the ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
5.
  • An encryption scheme for se... An encryption scheme for securing multiple medical images
    Banik, Arpita; Shamsi, Zeba; Laiphrakpam, Dolendro Singh Journal of information security and applications, December 2019, 2019-12-00, Letnik: 49
    Journal Article
    Recenzirano

    With the rise in medical imaging tools and telemedicine technology, the distance barriers in providing health care have been reduced by communicating patients data over the internet. To provide ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
6.
  • An efficient ElGamal crypto... An efficient ElGamal cryptosystem scheme
    Hussein, Haval I.; Abduallah, Wafaa M. International journal of computers & applications, 11/26/2021, Letnik: 43, Številka: 10
    Journal Article
    Recenzirano

    ElGamal Cryptosystem (EC) is a non-deterministic scheme which produces different outputs for the same input, making the cryptosystem more secure. On the other hand, the efficiency of its cryptosystem ...
Celotno besedilo
Dostopno za: BFBNIB, GIS, IJS, KISLJ, NUK, PNG, UL, UM, UPUK
7.
  • A multistage protocol for a... A multistage protocol for aggregated queries in distributed cloud databases with privacy protection
    Kelarev, Andrei; Yi, Xun; Badsha, Shahriar ... Future generation computer systems, January 2019, 2019-01-00, Letnik: 90
    Journal Article
    Recenzirano

    This article is devoted to the novel situation, where a large distributed cloud database is a union of several separate databases belonging to individual database owners who are not allowed to ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
8.
  • Distributed Secure Filterin... Distributed Secure Filtering Against Eavesdropping Attacks in SINR-Based Sensor Networks
    Fu, Xingquan; Wen, Guanghui; Niu, Mengfei ... IEEE transactions on information forensics and security, 2024, Letnik: 19
    Journal Article
    Recenzirano

    This paper focuses on the design of a privacy-preserving distributed Kalman filtering algorithm for a class of linear time-varying systems in signal-to-interference-plus-noise ratio (SINR)-based ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
9.
  • ElGamal cryptosystem-based ... ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications
    Maitra, Tanmoy; Obaidat, Mohammad S; Giri, Debasis ... IET networks, 09/2019, Letnik: 8, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    Life in modern society becomes easier due to the rapid growth of different technologies like real-time analytic, ubiquitous wireless communication, commodity sensors, machine learning and embedded ...
Celotno besedilo
Dostopno za: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK

PDF
10.
  • Cryptanalysis of an additiv... Cryptanalysis of an additively homomorphic public key encryption scheme
    Hong, Zhiyong; Zhou, Liguo; Zhan, Yu ... Computer standards and interfaces, August 2022, 2022-08-00, 20220801, Letnik: 82
    Journal Article
    Recenzirano

    •We proposed an attack algorithm for an ElGamal-based homomorphic encryption scheme constructed by Bae et al. 11.•The proposed attack is thorough and efficient.•The proposed attack algorithm can be ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
1 2 3 4 5
zadetkov: 65

Nalaganje filtrov