16   Artículos

 
en línea
Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang and Chin-Chen Chang    
Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting da... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad    
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Moatsum Alawida, Je Sen Teh and Wafa? Hamdan Alshoura    
Drone-based surveillance has become widespread due to its flexibility and ability to access hazardous areas, particularly in industrial complexes. As digital camera capabilities improve, more visual information can be stored in high-resolution images, re... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Alexey Semenkov, Dmitry Bragin, Yakov Usoltsev, Anton Konev and Evgeny Kostuchenko    
Modern facial recognition algorithms make it possible to identify system users by their appearance with a high level of accuracy. In such cases, an image of the user?s face is converted to parameters that later are used in a recognition process. On the o... ver más
Revista: Information    Formato: Electrónico

 
en línea
Haokun Fang and Quan Qian    
Privacy protection has been an important concern with the great success of machine learning. In this paper, it proposes a multi-party privacy preserving machine learning framework, named PFMLP, based on partially homomorphic encryption and federated lear... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yu Li, Liming Zhang, Xiaolong Wang, Xingang Zhang and Qihang Zhang    
Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW methods fo... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Weijing You, Lei Lei, Bo Chen and Limin Liu    
By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds. When combining with confidentiality, deduplication will become problemati... ver más
Revista: Information    Formato: Electrónico

 
en línea
Muath A. Obaidat, Suhaib Obeidat, Jennifer Holst, Abdullah Al Hayajneh and Joseph Brown    
The Internet of Things (IoT) has experienced constant growth in the number of devices deployed and the range of applications in which such devices are used. They vary widely in size, computational power, capacity storage, and energy. The explosive growth... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Soohwan Cho, Deokyoon Ko and Sooyoung Park    
Sensor data record-based dynamic encryption key technology which applies the mechanism of blockchain for security between devices in the low-power wireless communication environment of Internet of Things (IoT).
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Samira Briongos, Pedro Malagón, Juan-Mariano de Goyeneche and Jose M. Moya    
This work introduces a new approach to exploit the information gained from cache attacks. Contrary to previous approaches, we focus on cache misses to retrieve the secret AES encryption key more advantageously: we target the OpenSSL AES T-table-based imp... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »