نتایج جستجو برای: decryption
تعداد نتایج: 3453 فیلتر نتایج به سال:
Security concerns have taken front stage in the rapidly expanding digital exchange of data storage and transmission. Since use images is quickly across a wide range industries, it crucial to safeguard sensitive image from hackers. The need for protection has become critical. It now essential secure someone's privacy. preservation personal information been studied developed using variety ways. I...
This article examines the resource sharing functionality of decryption platform Europol. The supports European law enforcement agencies (LEAs) that are having difficulties accessing legally obtained encrypted evidence due to lack human and technical resources. investigates Europol’s transmission role with economy variables such as transaction cost trust-building. core argument is has a strong p...
In a Ciphertext-Policy Attribute-Based Encryption (CP-ABE) system, decryption privileges are defined over attributes that could be shared by multiple users. If some of the users leak their decryption privileges to the public or to some third party, say for profit gain, a conventional CP-ABE has no tracing mechanism for finding these malicious users out. There are two levels of traceability for ...
We present secret execution in which an encrypted program is evaluated without decryption, to give an encrypted result whose decryption yields the original result.
We show how to public-key obfuscate two commonly used shuffles: decryption shuffles which permute and decrypt ciphertexts, and re-encryption shuffles which permute and re-encrypt ciphertexts. Given a trusted party that samples and obfuscates a shuffle before any ciphertexts are received, this reduces the problem of constructing a mix-net to verifiable joint decryption. We construct a decryption...
This paper elaborates polybit shuffling encryption and decryption algorithm based on N Dimensional encryption-decryption matrix which is an attempt to improve over the Classical Playfair Cipher. The unique feature of this algorithm is that it retains the simplicity of Classical Playfair Cipher but increases the robustness against crypto-attack by many folds. Moreover this algorithm can be used ...
this paper presents a new audio encryption algorithm based on permutation and residue number system. in the current approach, signal samples are combined with residue number system through permutation; therefore, a specific noise is generated. then, the audio signal is combined with the noise, generated by the algorithm, to produce a silence signal. for this purpose, the algorithm uses a predef...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید