Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 157.066
1.
  • A Survey on Homomorphic Enc... A Survey on Homomorphic Encryption Schemes
    Acar, Abbas; Aksu, Hidayet; Uluagac, A. Selcuk ... ACM computing surveys, 09/2019, Letnik: 51, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. The users or service ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK

PDF
2.
  • Survey on JPEG compatible j... Survey on JPEG compatible joint image compression and encryption algorithms
    Li, Peiya; Lo, Kwok-Tung IET signal processing, 10/2020, Letnik: 14, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    In recent years, image encryption has been broadly researched. Since a large proportion of images on Internet are compressed, and JPEG is the most widely adopted standards for image compression, a ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
3.
  • Novel image encryption by c... Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map
    Zheng, Jieyu; Liu, LingFeng IET image processing, 09/2020, Letnik: 14, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    The one-dimensional (2D) chaotic encryption algorithm has good encryption performance. For its properties, such as the excellent complexity, pseudo-randomness, and sensitivity to the initial value of ...
Celotno besedilo
Dostopno za: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK

PDF
4.
  • Privacy-Preserving Deep Lea... Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
    Le Trieu Phong; Aono, Yoshinori; Hayashi, Takuya ... IEEE transactions on information forensics and security 13, Številka: 5
    Journal Article
    Recenzirano

    We present a privacy-preserving deep learning system in which many learning participants perform neural network-based deep learning over a combined dataset of all, without revealing the participants' ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
5.
  • A Secure and Efficient Ligh... A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices
    Rajesh, Sreeja; Paul, Varghese; Menon, Varun G. ... Symmetry (Basel), 02/2019, Letnik: 11, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Recent advancements in wireless technology have created an exponential rise in the number of connected devices leading to the internet of things (IoT) revolution. Large amounts of data are captured, ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK

PDF
6.
  • Blockchain-Aided Privacy-Pr... Blockchain-Aided Privacy-Preserving Medical Data Sharing Scheme for E-Healthcare System
    Liu, Jingwei; Fan, Yue; Sun, Rong ... IEEE internet of things journal, 12/2023, Letnik: 10, Številka: 24
    Journal Article
    Odprti dostop

    Due to the massive applications of Internet of Things (IoT) and the prevalence of wearable devices, e-healthcare systems are widely deployed in medical institutions. As a significant carrier of ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
7.
  • An improved attribute‐based... An improved attribute‐based encryption technique towards the data security in cloud computing
    Namasudra, Suyel Concurrency and computation, 10 February 2019, Letnik: 31, Številka: 3
    Journal Article
    Recenzirano

    Summary With the rapid development of the Internet, resource and knowledge sharing are two major problems experienced due to the presence of many hackers and malicious users. In this paper, an ...
Celotno besedilo
Dostopno za: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK
8.
  • 7-4 An Encrypted File Stora... 7-4 An Encrypted File Storage System with Hierarchical Levels of Sensitivity and its Applications
    Wang, Lihua; Hayashi, Takuya; Waseda, Atsushi ... Journal of the National Institute of Information and Communications Technology, 03/2017, Letnik: 63, Številka: 2
    Journal Article

    In this paper, we introduce a secure storage system named “PRINCESS” and an application, the PRINCESS-based automobile information sharing system that are developed utilizing a special proxy ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
9.
Celotno besedilo
Dostopno za: NUK, UL
10.
  • Cloud‐aided scalable revoca... Cloud‐aided scalable revocable identity‐based encryption scheme with ciphertext update
    Wang, Changji; Li, Yuan; Fang, Jian ... Concurrency and computation, 25 October 2017, Letnik: 29, Številka: 20
    Journal Article
    Recenzirano

    Summary Key revocation and ciphertext update are two critical issues for identity‐based encryption schemes. Designing an identity‐based encryption scheme with key revocation and ciphertext update ...
Celotno besedilo
Dostopno za: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK
1 2 3 4 5
zadetkov: 157.066

Nalaganje filtrov