نتایج جستجو برای: decryption

تعداد نتایج: 3453  

Journal: :Journal of Computer Virology and Hacking Techniques 2017

Journal: :International Journal of Computer Applications 2013

Journal: :Indian Scientific Journal Of Research In Engineering And Management 2023

Security concerns have taken front stage in the rapidly expanding digital exchange of data storage and transmission. Since use images is quickly across a wide range industries, it crucial to safeguard sensitive image from hackers. The need for protection has become critical. It now essential secure someone's privacy. preservation personal information been studied developed using variety ways. I...

Journal: :Journal of Cryptographic Engineering 2017

Journal: :Journal of Contemporary European Studies 2021

This article examines the resource sharing functionality of decryption platform Europol. The supports European law enforcement agencies (LEAs) that are having difficulties accessing legally obtained encrypted evidence due to lack human and technical resources. investigates Europol’s transmission role with economy variables such as transaction cost trust-building. core argument is has a strong p...

Journal: :IACR Cryptology ePrint Archive 2012
Zhen Liu Zhenfu Cao Duncan S. Wong

In a Ciphertext-Policy Attribute-Based Encryption (CP-ABE) system, decryption privileges are defined over attributes that could be shared by multiple users. If some of the users leak their decryption privileges to the public or to some third party, say for profit gain, a conventional CP-ABE has no tracing mechanism for finding these malicious users out. There are two levels of traceability for ...

2012
Daejun Park Jeehoon Kang Kihong Heo Sungkeun Cho Yongho Yoon Kwangkeun Yi

We present secret execution in which an encrypted program is evaluated without decryption, to give an encrypted result whose decryption yields the original result.

Journal: :IACR Cryptology ePrint Archive 2005
Ben Adida Douglas Wikström

We show how to public-key obfuscate two commonly used shuffles: decryption shuffles which permute and decrypt ciphertexts, and re-encryption shuffles which permute and re-encrypt ciphertexts. Given a trusted party that samples and obfuscates a shuffle before any ciphertexts are received, this reduces the problem of constructing a mix-net to verifiable joint decryption. We construct a decryption...

2012
Harinandan Tunga

This paper elaborates polybit shuffling encryption and decryption algorithm based on N Dimensional encryption-decryption matrix which is an attempt to improve over the Classical Playfair Cipher. The unique feature of this algorithm is that it retains the simplicity of Classical Playfair Cipher but increases the robustness against crypto-attack by many folds. Moreover this algorithm can be used ...

Journal: :journal of advances in computer research 0
fereshteh ghanbari adivi m.sc. computer systems architecture, dezfoul branch, islamic azad university, dezfoul, iran mohammad mehrnia m.sc. computer systems architecture, dezfoul branch, islamic azad university, dezfoul, iran

this paper presents a new audio encryption algorithm based on permutation and residue number system. in the current approach, signal samples are combined with residue number system through permutation; therefore, a specific noise is generated. then, the audio signal is combined with the noise, generated by the algorithm, to produce a silence signal. for this purpose, the algorithm uses a predef...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید