|
|
|
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl...
ver más
|
|
|
|
|
|
|
Yongli Tang, Deng Pan, Panke Qin and Liping Lv
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks. Group signature is regarde...
ver más
|
|
|
|
|
|
|
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove...
ver más
|
|
|
|
|
|
|
Ciro Caliendo, Isidoro Russo and Gianluca Genovese
We have developed a traffic simulation model to quantitatively assess the resilience of a twin-tube motorway tunnel in the event of traffic accident or fire occurring within a tube. The motorway section containing the tunnel was investigated for differen...
ver más
|
|
|
|
|
|
|
Hwai-Tsu Hu, Ying-Hsiang Lu
Pág. 18 - 32
This paper presents a lifting wavelet transform (LWT)-based blind audio watermarking scheme designed for tampering detection and self-recovery. Following 3-level LWT decomposition of a host audio, the coefficients in selected subbands are first partition...
ver más
|
|
|
|
|
|
|
Alexander Grusho,Alexander Zatsarinny,Elena Timonina
Pág. 46 - 50
It is considered in the article the implementation issues of one of the digital economy basic directions related to information security concerning the protection of information in distributed ledgers. Any information system has to be constructed on the ...
ver más
|
|
|
|
|
|
|
Victoria Gitelman, Fany Pesahov, Roby Carmel, Shlomo Bekhor
Pág. 4160 - 4169
Road design characteristics should deliver a clear message to drivers on the appropriate speeds. This approach is known in the literature as ?self-explaining roads? (SER). In Israel, new guidelines for setting speeds on the road network were introduced a...
ver más
|
|
|
|
|
|
|
Won Min Kang, Jae Dong Lee and Jong Hyuk Park
Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic. Moreover, automobiles are increasingly equipped with a black box for accident pre...
ver más
|
|
|
|
|
|
|
Rao, S; Alvisi, L; Vin, H M
Pág. 160 - 173
|
|
|
|