Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 64
11.
  • A Secure Privacy-Preserving... A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems
    Ara, Anees; Al-Rodhaan, Mznah; Yuan Tian ... IEEE access, 01/2017, Letnik: 5
    Journal Article
    Recenzirano
    Odprti dostop

    Due to advancements in the development of wireless medical sensing devices and wireless communication technologies, the wireless body area network (WBAN) has become an eminent part of e-healthcare ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
12.
  • A new distribution version ... A new distribution version of Boneh-Goh-Nissim cryptosystem : Security and performance analysis
    Benamara, Oualid; Merazka, Fatiha Journal of discrete mathematical sciences & cryptography, 08/2022, Letnik: 25, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    The aim of this paper is to provide two distributed versions of the Boneh-Goh-Nissim Cryptosystem (BGNC). We give a proof of the semantic security for the first one. This guaranties that our ...
Celotno besedilo
Dostopno za: UPUK

PDF
13.
  • Audio Encryption Using Amel... Audio Encryption Using Ameliorated ElGamal Public Key Encryption Over Finite Field
    Khoirom, Motilal Singh; Laiphrakpam, Dolendro Singh; Tuithung, Themrichon Wireless personal communications, 03/2021, Letnik: 117, Številka: 2
    Journal Article
    Recenzirano

    Performing encryption using ElGamal public key encryption over finite field requires imbedding of message which is represented by integers. These integers are to be imbedded to a coordinate location ...
Celotno besedilo
Dostopno za: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
14.
  • On the Security of a Varian... On the Security of a Variant of ElGamal Encryption Scheme
    Rao, Fang-Yu IEEE transactions on dependable and secure computing, 07/2019, Letnik: 16, Številka: 4
    Journal Article
    Odprti dostop

    Recently, based on the Paillier cryptosystem 1 , Yi et al. outline a distributed ElGamal cryptosystem which allows for both a much simpler distributed key generation procedure and a more efficient ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
15.
  • Privacy protection in smart... Privacy protection in smart meters using homomorphic encryption: An overview
    Abreu, Zita; Pereira, Lucas Wiley interdisciplinary reviews. Data mining and knowledge discovery, July/August 2022, 2022-07-00, 20220701, Letnik: 12, Številka: 4
    Journal Article
    Recenzirano

    This article presents an overview of the literature on privacy protection in smart meters with a particular focus on homomorphic encryption (HE). Firstly, we introduce the concept of smart meters, ...
Celotno besedilo
Dostopno za: BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
16.
  • An optimal and efficient da... An optimal and efficient data security technique through crypto-stegano for E-commerce
    Kumbhakar, Dulal; Sanyal, Kanchan; Karforma, Sunil Multimedia tools and applications, 06/2023, Letnik: 82, Številka: 14
    Journal Article
    Recenzirano
    Odprti dostop

    E-Commerce or Electronic commerce is the buying and selling of goods and services in which any commercial transactions through wireless electronic devices such as hand-held computers (tablets), ...
Celotno besedilo
Dostopno za: CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
17.
  • Cryptanalysis of an Improve... Cryptanalysis of an Improvement of Robust Deniable Authentication Protocol
    Sadeghpour, Mahshid Bulletin de la Société royale des sciences de Liège, 2016, Letnik: 85
    Journal Article
    Recenzirano
    Odprti dostop

    Deniable authentication protocol, as an advanced method of authentication, enables the intended receiver of a given message to identify the source of the message while preventing the receiver to ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
18.
  • Survey on SAP and its appli... Survey on SAP and its application in public-key cryptography
    Goel, Neha; Gupta, Indivar; Dass, B. K. Journal of mathematical cryptology, 01/2020, Letnik: 14, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The concept of the semigroup action problem (SAP) was first introduced by Monico in 2002. Monico explained in his paper that the discrete logarithm problem (DLP) can be generalized to SAP. After ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
19.
  • Reversible Video Steganogra... Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem
    Mstafa, Ramadhan J Computers, materials & continua, 2022, Letnik: 72, Številka: 2
    Journal Article
    Odprti dostop

    The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet's speed and information technology. In spite of this, advancements in technology have ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
20.
  • Improved cryptanalysis of a... Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings
    Pandey, Atul; Gupta, Indivar; Kumar Singh, Dhiraj Journal of mathematical cryptology, 01/2021, Letnik: 15, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    ElGamal cryptosystem has emerged as one of the most important construction in Public Key Cryptography (PKC) since Diffie-Hellman key exchange protocol was proposed. However, public key schemes which ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
1 2 3 4 5
zadetkov: 64

Nalaganje filtrov