نتایج جستجو برای: data encryption
تعداد نتایج: 2426326 فیلتر نتایج به سال:
In today’s world everyone is using cloud services. Every user uploads his/her sensitive data on in encrypted form. If wants to perform any type of computation data, has share credentials with administrator. Which puts privacy risk. does not provider, download all and only then decryption process can be performed. This research, focuses ECC based homomorphic encryption scheme good by considering...
Encrypting data based on the attributes of robots is one effective methods to control access users in outsourcing environment. Therefore, a mathematical modeling method robot attribute encryption redundancy elimination technology proposed. The algorithm structure analyzed Bloom filter. Hamming distance used calculate similarity big by Finally, ellipse designed according calculation results. res...
In this paper, a new structure for image encryption using recursive cellular automatais presented. The image encryption contains three recursive cellular automata in three steps, individually. At the first step, the image is blocked and the pixels are substituted. In the next step, pixels are scrambledby the second cellular automata and at the last step, the blocks are attachedtogether and the ...
Data aggregation in wireless sensor networks (WSN) helps eliminate information redundancy and increase the lifetime of the network. When homomorphic encryption is used for data aggregation, end-to-end encryption is achieved and aggregation function like average or minimum/maximum can be computed on the encrypted data. Aggregation functions like minimum/maximum rely on comparison operation. But,...
LPWANs are a class of technologies that have very low power consumption and high range of communication. Along with its various advantages, these technologies also have many limitations, such as low bandwidth, connectionless transmission and low processing power, which has challenged encryption methods in this technologies. One of the most important of these challenges is encryption. The very s...
Email cryptography applications often suffer from major problems that prevent their widespread implementation. MEG, or the Mobile Encryption Gateway aims to fix the issues associated with email encryption by ensuring that encryption is easy to perform while still maintaining data security. MEG performs automatic decryption and encryption of all emails using PGP. Users do not need to understand ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید