Encryption ≈ EncryptionEncryption
View article
Quantum cryptography: Public key distribution and coin tossing Open
When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communicat…
View article
A Survey on Homomorphic Encryption Schemes Open
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. The users or service providers with the key have exclusive ri…
View article
Characterization of Encrypted and VPN Traffic using Time-related Features Open
Traffic characterization is one of the major challenges in today’s security industry. The continuous evolution
and generation of new applications and services, together with the expansion of encrypted communications
makes it a difficult ta…
View article
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM Open
\n Contains fulltext :\n 195423pub.pdf (Publisher’s version ) (Open Access)\n \n Contains fulltext :\n 195423pre.pdf (Author’s version preprint ) (Open Access)\n
View article
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues Open
Today is the era of the Internet of Things (IoT). The recent advances in hardware and information technology have accelerated the deployment of billions of interconnected, smart and adaptive devices in critical infrastructures like health,…
View article
Blockchain and IoT Integration: A Systematic Survey Open
The Internet of Things (IoT) refers to the interconnection of smart devices to collect data and make intelligent decisions. However, a lack of intrinsic security measures makes IoT vulnerable to privacy and security threats. With its “secu…
View article
Cosine-transform-based chaotic system for image encryption Open
Chaos is known as a natural candidate for cryptography applications owing to its properties such as unpredictability and initial state sensitivity. However, certain chaos-based cryptosystems have been proven to exhibit various security def…
View article
Big healthcare data: preserving security and privacy Open
Big data has fundamentally changed the way organizations manage, analyze and leverage data in any industry. One of the most promising fields where big data can be applied to make a change is healthcare. Big healthcare data has considerable…
View article
Ultralong room temperature phosphorescence from amorphous organic materials toward confidential information encryption and decryption Open
Ultralong room temperature phosphorescence is achieved from amorphous organic materials toward information encryption.
View article
A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems Open
In traditional cloud storage systems, attribute-based encryption (ABE) is regarded as an important technology for solving the problem of data privacy and fine-grained access control. However, in all ABE schemes, the private key generator h…
View article
Memristive technologies for data storage, computation, encryption, and radio-frequency communication Open
Memristive devices, which combine a resistor with memory functions such that voltage pulses can change their resistance (and hence their memory state) in a nonvolatile manner, are beginning to be implemented in integrated circuits for memo…
View article
Deep Learning for Encrypted Traffic Classification: An Overview Open
Traffic classification has been studied for two decades and applied to a wide\nrange of applications from QoS provisioning and billing in ISPs to\nsecurity-related applications in firewalls and intrusion detection systems.\nPort-based, dat…
View article
Dynamic plasmonic colour display Open
Plasmonic colour printing based on engineered metasurfaces has revolutionized colour display science due to its unprecedented subwavelength resolution and high-density optical data storage. However, advanced plasmonic displays with novel f…
View article
Secure Medical Data Transmission Model for IoT-Based Healthcare Systems Open
Due to the significant advancement of the Internet of Things (IoT) in the healthcare sector, the security, and the integrity of the medical data became big challenges for healthcare services applications. This paper proposes a hybrid secur…
View article
Website Fingerprinting at Internet Scale Open
The website fingerprinting attack aims to identify the content (i.e., a webpage accessed by a client) of encrypted and anonymized connections by observing patterns of data flows such as packet size and direction.This attack can be performe…
View article
Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems Open
Electronic Health Records (EHRs) are entirely controlled by hospitals instead of patients, which complicates seeking medical advices from different hospitals. Patients face a critical need to focus on the details of their own healthcare an…
View article
Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks Open
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved\nsignificantly in the last years and their use has been suggested for numerous\napplications due to their ability to provide transparency, redundancy and\naccountabil…
View article
Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues Open
With the explosive growth of Internet of Things devices and massive data produced at the edge of the network, the traditional centralized cloud computing model has come to a bottleneck due to the bandwidth limitation and resources constrai…
View article
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT Open
Fog computing-enhanced Internet of Things (IoT) has recently received considerable attention, as the fog devices deployed at the network edge can not only provide low latency, location awareness but also improve real-time and quality of se…
View article
An Empirical Study on Modeling and Prediction of Bitcoin Prices With Bayesian Neural Networks Based on Blockchain Information Open
Bitcoin has recently attracted considerable attention in the fields of economics, cryptography, and computer science due to its inherent nature of combining encryption technology and monetary units. This paper reveals the effect of Bayesia…
View article
Data Security and Privacy Protection for Cloud Storage: A Survey Open
The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world's digital economy are at the top of the tide. The continuous growth of data storage pressure drives the rapid developme…
View article
Roadmap on optical security Open
The status and prospects for the use of optical multiple-scattering materials as physical unclonable function for authentication is reviewed.
View article
Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption Open
Consider two data providers, each maintaining private records of different feature sets about common entities. They aim to learn a linear model jointly in a federated setting, namely, data is local and a shared model is trained from locall…
View article
Potentials of Blockchain Technology for Construction Management Open
Blockchain technology enables distributed, encrypted and secure logging of digital transactions. It is the underlying technology of Bitcoin and other cryptocurrencies. Blockchain is expected to revolutionize computing in several areas, par…
View article
Key Generation From Wireless Channels: A Review Open
Key generation from the randomness of wireless channels is a promising alternative to public key cryptography for the establishment of cryptographic keys between any two users. This paper reviews the current techniques for wireless key gen…
View article
A Search Engine Backed by Internet-Wide Scanning Open
Fast Internet-wide scanning has opened new avenues for security research, ranging from uncovering widespread vulnerabilities in random number generators to tracking the evolving impact of Heartbleed. However, this technique still requires …
View article
End-to-end privacy preserving deep learning on multi-institutional medical imaging Open
Using large, multi-national datasets for high-performance medical imaging AI systems requires innovation in privacy-preserving machine learning so models can train on sensitive data without requiring data transfer. Here we present PriMIA (…
View article
Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessment Open
Systematic gaps in compliance with data protection principles in accredited health apps question whether certification programs relying substantially on developer disclosures can provide a trusted resource for patients and clinicians. Accr…
View article
Chameleon Open
We present Chameleon, a novel hybrid (mixed-protocol) framework for secure function evaluation (SFE) which enables two parties to jointly compute a function without disclosing their private inputs. Chameleon combines the best aspects of ge…
View article
Recommendation for Key Management Part 1: General Open
3541 et seq., Public Law (P.L.) 113-283.NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to …