نتایج جستجو برای: lightweight cryptography

تعداد نتایج: 58663  

A. Cheraghi , M. Hadian Dehkordi ,

 Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

Due to the fast development in information and communication technology, new challenging problems appear in the security. So, it is important and vital that the scientific society of our country focuses on research and studies these problems and by providing new proposal try to respond to these critical needs of our country. Hence, our aim in this paper is to study and highlight one of the impo...

Ali Delnavaz, Pouria Javadi

Self-compacting concrete is a new high performance concrete with high ductility and segregation resistance. In recent years, construction material manufacturers have focused their attention on lightweight concrete and have strived to use lightweight concrete, if possible, in load-bearing parts of buildings. Concrete with both self-compacting and lightweight properties is favourable in this cont...

Journal: :ACM Computing Surveys 2023

Physical Unclonable Function (PUF) has recently attracted interest from both industry and academia as a potential alternative approach to secure Internet of Things (IoT) devices the more traditional computational-based using conventional cryptography. PUF is promising solution for lightweight security, where manufacturing fluctuation process IC used improve security IoT it provides low complexi...

Journal: :Sensors 2021

Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still its infancy. Most postquantum based cryptosystems have longer keys and signature sizes require more computations that span several orders magnitude energy consumption computation time, hence are considered as another aspect green design. To address these issues, solu...

Journal: :Journal of Mathematical Sciences & Computational Mathematics 2020

Journal: :journal of rehabilitation in civil engineering 2014
azadeh alsadat asghari zahra tabrizian morteza hossein ali beigy gholamreza ghodrati amiri bahram navayineya

. this paper presents the results of an experimental investigation on shear strength enhancement of reinforced concrete deep beams externally reinforced with fiber reinforced polymer (frp) composites. a total of six deep beam specimens of two different classes, as-built (unstrengthened) and retrofitted were tested in the experimental evaluation program. two composite systems namely carbon/epoxy...

Journal: :Etri Journal 2023

Authenticated multiple key agreement (AMKA) protocols provide participants with session keys after one round of authentication. Many schemes use Diffie–Hellman or authenticated that rely on hard integer factorizations are vulnerable to quantum algorithms. Lattice cryptography provides resistance protocols, but the certificate always incurs excessive public infrastructure management overhead. Th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید