13   Artículos

 
en línea
Huang Zhang, Ting Huang, Fangguo Zhang, Baodian Wei and Yusong Du    
A bilinear map whose domain and target sets are identical is called a self-bilinear map. Original self-bilinear maps are defined over cyclic groups. Since the map itself reveals information about the underlying cyclic group, the Decisional Diffie?Hellman... ver más
Revista: Information    Formato: Electrónico

 
en línea
Junxin Huang, Yuchuan Luo, Ming Xu, Bowen Hu and Jian Long    
Online ride-hailing (ORH) services allow people to enjoy on-demand transportation services through their mobile devices in a short responding time. Despite the great convenience, users need to submit their location information to the ORH service provider... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hiroki Okada, Shinsaku Kiyomoto and Carlos Cid    
TFHE is a fast fully homomorphic encryption scheme proposed by Chillotti et al. in Asiacrypt? 2018. Integer-wise TFHE is a generalized version of TFHE that can encrypt the plaintext of an integer that was implicitly presented by Chillotti et al., and Bou... ver más
Revista: Information    Formato: Electrónico

 
en línea
Alla Gavrilova,Ihor Volkov,Yuliia Kozhedub,Roman Korolev,Oleksandr Lezik,Volodymyr Medvediev,Oleksandr Milov,Bogdan Tomashevsky,Andrii Trystan,Oksana Chekunova     Pág. 45 - 63
The development of computer technology has determined the vector for the expansion of services based on the Internet and ?G? technologies. The main requirements for modern services in the banking sector are security and reliability. At the same time, sec... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

 
en línea
Asmaa Abdallah, M. Zulfiker Ali, Jelena Mi?ic and Vojislav B. Mi?ic    
The Unmanned Aerial Vehicles (UAVs) play a significant role to alleviate the negative impacts of disasters by providing essential assistance to the rescue and evacuation operations in the affected areas. Then, the reliability of UAV connections and the a... ver más
Revista: Information    Formato: Electrónico

 
en línea
Pramod T. C., Thejas G. S., S. S. Iyengar and N. R. Sunitha    
Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches. Many security breac... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
????????? ???????? ?????     Pág. 5 - 14
The subject matter of the study is the encryption of information in cloud data computation and storage. Cloud technologies enable reducing the cost of IT infrastructure significantly and responding to changes in computing needs flexibly. In this case, th... ver más

« Anterior     Página: 1 de 1     Siguiente »