|
|
|
Huang Zhang, Ting Huang, Fangguo Zhang, Baodian Wei and Yusong Du
A bilinear map whose domain and target sets are identical is called a self-bilinear map. Original self-bilinear maps are defined over cyclic groups. Since the map itself reveals information about the underlying cyclic group, the Decisional Diffie?Hellman...
ver más
|
|
|
|
|
|
|
Junxin Huang, Yuchuan Luo, Ming Xu, Bowen Hu and Jian Long
Online ride-hailing (ORH) services allow people to enjoy on-demand transportation services through their mobile devices in a short responding time. Despite the great convenience, users need to submit their location information to the ORH service provider...
ver más
|
|
|
|
|
|
|
Hiroki Okada, Shinsaku Kiyomoto and Carlos Cid
TFHE is a fast fully homomorphic encryption scheme proposed by Chillotti et al. in Asiacrypt? 2018. Integer-wise TFHE is a generalized version of TFHE that can encrypt the plaintext of an integer that was implicitly presented by Chillotti et al., and Bou...
ver más
|
|
|
|
|
|
|
Alla Gavrilova,Ihor Volkov,Yuliia Kozhedub,Roman Korolev,Oleksandr Lezik,Volodymyr Medvediev,Oleksandr Milov,Bogdan Tomashevsky,Andrii Trystan,Oksana Chekunova
Pág. 45 - 63
The development of computer technology has determined the vector for the expansion of services based on the Internet and ?G? technologies. The main requirements for modern services in the banking sector are security and reliability. At the same time, sec...
ver más
|
|
|
|
|
|
|
Asmaa Abdallah, M. Zulfiker Ali, Jelena Mi?ic and Vojislav B. Mi?ic
The Unmanned Aerial Vehicles (UAVs) play a significant role to alleviate the negative impacts of disasters by providing essential assistance to the rescue and evacuation operations in the affected areas. Then, the reliability of UAV connections and the a...
ver más
|
|
|
|
|
|
|
Pramod T. C., Thejas G. S., S. S. Iyengar and N. R. Sunitha
Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches. Many security breac...
ver más
|
|
|
|
|
|
|
????????? ???????? ?????
Pág. 5 - 14
The subject matter of the study is the encryption of information in cloud data computation and storage. Cloud technologies enable reducing the cost of IT infrastructure significantly and responding to changes in computing needs flexibly. In this case, th...
ver más
|
|
|
|