NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 829
1.
  • A novel biometric authentic... A novel biometric authentication scheme with privacy protection based on SVM and ZKP
    Guo, Chunjie; You, Lin; Li, Xingyu ... Computers & security, September 2024, Letnik: 144
    Journal Article
    Recenzirano
    Odprti dostop

    Biometric authentication is a very convenient and user-friendly method. The popularity of this method requires strong privacy-preserving technology to prevent the disclosure of template information. ...
Celotno besedilo
2.
  • A blockchain-orchestrated d... A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system
    Kumar, Prabhat; Kumar, Randhir; Gupta, Govind P. ... Journal of parallel and distributed computing, February 2023, 2023-02-00, Letnik: 172
    Journal Article
    Recenzirano
    Odprti dostop

    The integration of the Internet of Things (IoT) with traditional healthcare systems has improved quality of healthcare services. However, the wearable devices and sensors used in Healthcare System ...
Celotno besedilo
3.
  • A blockchain-based scheme f... A blockchain-based scheme for privacy-preserving and secure sharing of medical data
    Huang, Haiping; Zhu, Peng; Xiao, Fu ... Computers & security, 12/2020, Letnik: 99
    Journal Article
    Recenzirano
    Odprti dostop

    How to alleviate the contradiction between the patient's privacy and the research or commercial demands of health data has become the challenging problem of intelligent medical system with the ...
Celotno besedilo

PDF
4.
  • A zero-knowledge-proof-base... A zero-knowledge-proof-based digital identity management scheme in blockchain
    Yang, Xiaohui; Li, Wenjie Computers & security, December 2020, 2020-12-00, Letnik: 99
    Journal Article
    Recenzirano

    The traditional centralized digital identity management system (DIMS) has been subject to threats such as fragmented identity, single point of failure, internal attacks and privacy leakage. Emerging ...
Celotno besedilo
5.
  • Preserving transaction priv... Preserving transaction privacy in bitcoin
    Wang, Qin; Qin, Bo; Hu, Jiankun ... Future generation computer systems, June 2020, 2020-06-00, Letnik: 107
    Journal Article
    Recenzirano

    As bitcoin has received considerable attentions, a large number of transactions are increasingly published through the Internet. The potential threat to online transactions is not only limited to the ...
Celotno besedilo
6.
  • Physical zero-knowledge pro... Physical zero-knowledge proof for Ripple Effect
    Ruangwises, Suthee; Itoh, Toshiya Theoretical computer science, 12/2021, Letnik: 895
    Journal Article
    Recenzirano
    Odprti dostop

    Ripple Effect is a logic puzzle where the player has to fill numbers into empty cells in a rectangular grid. The grid is divided into rooms, and each room must contain consecutive integers starting ...
Celotno besedilo

PDF
7.
  • A Multi-Round Zero Knowledg... A Multi-Round Zero Knowledge Proof Algorithm for Secure IoT and Blockchain Environments
    Rani, Deebakkarthi Chinnasame; Janakiraman, Sai Ganesh; Chandra, Kommula Serath ... International journal of safety and security engineering, 09/2023, Letnik: 13, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Presented herein is a novel algorithm for multi-round, zero-knowledge proof (ZKP), devised specifically for authenticating factorisation proofs within a variety of cryptographic applications. This ...
Celotno besedilo
8.
Celotno besedilo

PDF
9.
Celotno besedilo
10.
  • Bulletproofs: Short Proofs for Confidential Transactions and More
    Bunz, Benedikt; Bootle, Jonathan; Boneh, Dan ... 2018 IEEE Symposium on Security and Privacy (SP), 05/2018
    Conference Proceeding
    Odprti dostop

    We propose Bulletproofs, a new non-interactive zero-knowledge proof protocol with very short proofs and without a trusted setup; the proof size is only logarithmic in the witness size. Bulletproofs ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 829

Nalaganje filtrov