19   Artículos

 
en línea
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng    
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yongli Tang, Deng Pan, Panke Qin and Liping Lv    
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks. Group signature is regarde... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan    
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ciro Caliendo, Isidoro Russo and Gianluca Genovese    
We have developed a traffic simulation model to quantitatively assess the resilience of a twin-tube motorway tunnel in the event of traffic accident or fire occurring within a tube. The motorway section containing the tunnel was investigated for differen... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hwai-Tsu Hu, Ying-Hsiang Lu     Pág. 18 - 32
This paper presents a lifting wavelet transform (LWT)-based blind audio watermarking scheme designed for tampering detection and self-recovery. Following 3-level LWT decomposition of a host audio, the coefficients in selected subbands are first partition... ver más
Revista: Advances in Technology Innovation    Formato: Electrónico

 
en línea
Alexander Grusho,Alexander Zatsarinny,Elena Timonina     Pág. 46 - 50
It is considered in the article the implementation issues of one of the digital economy basic directions related to information security concerning the protection of information in distributed ledgers. Any information system has to be constructed on the ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Victoria Gitelman, Fany Pesahov, Roby Carmel, Shlomo Bekhor     Pág. 4160 - 4169
Road design characteristics should deliver a clear message to drivers on the appropriate speeds. This approach is known in the literature as ?self-explaining roads? (SER). In Israel, new guidelines for setting speeds on the road network were introduced a... ver más
Revista: Transportation Research Procedia    Formato: Electrónico

 
en línea
Won Min Kang, Jae Dong Lee and Jong Hyuk Park    
Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic. Moreover, automobiles are increasingly equipped with a black box for accident pre... ver más
Revista: Information    Formato: Electrónico

 
usuarios registrados
Rao, S; Alvisi, L; Vin, H M     Pág. 160 - 173

« Anterior     Página: 1 de 1     Siguiente »