نتایج جستجو برای: resilient cryptography

تعداد نتایج: 52839  

2013
Georg Nawratil

We transfer the basic idea of bonds, introduced by Hegedüs, Schicho and Schröcker for overconstrained closed chains with rotational joints, to the theory of self-motions of parallel manipulators of Stewart Gough type. Moreover we present some basic facts and results on bonds and demonstrate the potential of this theory on the basis of several examples. As a by-product we give a geometric charac...

2014
Lisa Bruttel

This paper presents results from an experiment on the effects of retail-price recommendations (RPRs) on consumer and retailer behavior. Despite their non-binding nature, RPRs may influence consumers’ willingness to pay by setting a reference point. Loss averse consumers will then be reluctant to pay a price higher than the recommended one. Furthermore, at a given price level consumers will dema...

2012
Feng-Hao Liu

My research interests center around the area of error-tolerant cryptography. In cryptography, our goal is to design protocols that withstand malicious behavior of an adversary. Traditionally, the focus was on a setting where honest users followed their protocol exactly, without fault. But what if an adversary can induce faults, for example a physical attack that changes the state of a user’s co...

2014
T. Nataraj S. K. Mahalingam

Security has emerged as the most feared aspect of cloud computing and a major hindrance for the customers. In existing system for establishing secure and privacy-assured service outsourcing in cloud computing which uses Linear programming and compressed sensing techniques to transform images, which aims to take security, complexity, and efficiency into consideration from the very beginning of t...

Ali Khodaii Arash Saleh Ahari, Fereydoon Moghadas Nejad Hasan Taherkhani,

Resilient modulus of pavement materials is a key property required for the pavement thickness design. This paper describes the results of an experimental study on the effects of temperature and loading frequency on the resilient modulus of a SBS polymer modified asphalt concrete under dry and saturated conditions. Dynamic creep tests were conducted on dry and saturated specimens of the mixture ...

This paper mirrors an invited talk to ISCISC 2011. It is not a conventional paper so much as an essay summarizing thoughts on a little-talked-about subject. My goal is to intermix some introspection about definitions with examples of them, these examples drawn mostly from cryptography. Underpinning our discussion are two themes. The first is that definitions are constructed. They are i...

Journal: :IEEE Communications Surveys and Tutorials 2021

Cyber Physical Systems (CPS) are characterized by their ability to integrate the physical and information or cyber worlds. Their deployment in critical infrastructure have demonstrated a potential transform world. However, harnessing this is limited nature far reaching effects of attacks on human, environment. An attraction for concerns CPS rises from process sending sensors actuators over wire...

Journal: : 2023

A proposal for an image encryption algorithm called Chaos and DNA Based Image Encryption Algorithm (CDIEA) has been put forward. CDIEA is a combination of block cipher algorithms, permutations, chaotic keys, operations. It leverages the strong structures modern cryptography properties systems, rather than relying solely on chaos. The permutations used in are constructed using strategy wide trai...

Journal: :Applied sciences 2021

Microgrids are growing in importance the Smart Grid paradigm for power systems. Microgrid security is becoming crucial since these systems increasingly rely on information and communication technologies. Many technologies have been proposed last few years protection of industrial control systems, ranging from cryptography, network security, monitoring innovative strategies resilient to cyber-at...

Journal: :international journal of group theory 2015
claude carlet yin tan

we give a survey of recent applications of group rings to combinatorics and tocryptography, including their use in the di erential cryptanalysis of block ciphers.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید