We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Image encryption scheme based on symmetric multimodal skew tent map

    This paper proposes a novel scheme for image encryption based on symmetric multimodal skew tent map. The proposed map exhibits good statistical...

    Ahmed Sahnoune, Elhadj Zeraoulia in Multimedia Tools and Applications
    Article 25 January 2024
  2. Updatable and Dynamic Searchable Symmetric Encryption Scheme with Forward and Backward Privacy

    Dynamic searchable symmetric encryption (DSSE) enables search and modification on encrypted data. While considerable efforts have been dedicated to...
    Huijuan Qiu, Zhenhua Liu in Frontiers in Cyber Security
    Conference paper 2024
  3. Lightweight symmetric key encryption for text using XOR operation and permutation matrix

    Traditionally, symmetric key encryption has been computationally intensive, and the balance between security and computation costs has necessitated...

    Maroti Deshmukh, Arjun Singh Rawat in International Journal of Information Technology
    Article 14 August 2023
  4. Efficient searchable symmetric encryption supporting range queries

    The demand for cloud storage services continuously increases putting at risk the privacy of the outsourced data. Data encryption is the obvious...

    Eirini Molla, Panagiotis Rizomiliotis, Stefanos Gritzalis in International Journal of Information Security
    Article 09 February 2023
  5. Novel secure data protection scheme using Martino homomorphic encryption

    Globally, data maintenance and its security are vital tasks due to the rapid development of advanced technologies. Users now utilise Cloud computing...

    Ch. Rupa, Greeshmanth, Mohd Asif Shah in Journal of Cloud Computing
    Article Open access 27 March 2023
  6. A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm

    In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting...

    Sanjay Kumar, Deepmala Sharma in Artificial Intelligence Review
    Article Open access 12 March 2024
  7. Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation

    With the rapid deployment of storage services, secure and efficient user authorization and revocation data shared through the cloud have become a...

    Dilxat Ghopur, Jianfeng Ma, ... Tao Jiang in Science China Information Sciences
    Article 19 June 2023
  8. A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing

    Cloud services provide an optimal form of demand based data outsourcing. The large amount of user data sharing increases the possibility of attacks,...

    Pranav Shrivastava, Bashir Alam, Mansaf Alam in Multimedia Tools and Applications
    Article 27 September 2023
  9. Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security

    Wildcard Searchable Symmetric Encryption can achieve flexibility and pattern matching while protecting data privacy. There is a promising future for...
    ** Zhang, Ye Su, ... **g Qin in Artificial Intelligence Security and Privacy
    Conference paper 2024
  10. A plaintext-related image encryption scheme based on key generation using generative adversarial networks

    Image encryption based on chaotic systems is a hot research topic in recent decade. However, the existing methods have shortcomings in key generation...

    Ruihu Zhang, **aobing Kang, ... Yajun Chen in Multimedia Tools and Applications
    Article 22 April 2024
  11. The COLM Authenticated Encryption Scheme

    In this work we present the COLM authenticated encryption (AE) scheme which is the second of the two winners in the defense in depth category of the...

    Elena Andreeva, Andrey Bogdanov, ... Kan Yasuda in Journal of Cryptology
    Article 07 March 2024
  12. Injection-Secure Structured and Searchable Symmetric Encryption

    Recent work on dynamic structured and searchable symmetric encryption has focused on achieving the notion of forward-privacy. This is mainly...
    Ghous Amjad, Seny Kamara, Tarik Moataz in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  13. TPE-MM: Thumbnail preserving encryption scheme based on Markov model for JPEG images

    Advances in mobile communication have enabled images to be shared more conveniently, and the consequent risk of privacy breaches has been...

    **uli Chai, Guoqiang Long, ... Yushu Zhang in Applied Intelligence
    Article 23 February 2024
  14. Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud

    Cloud-based data sharing addresses the limited storage availability problem for resource-constrained users albeit at the cost of privacy and the need...

    Raghav, Nitish Andola, ... Shekhar Verma in The Journal of Supercomputing
    Article 03 April 2023
  15. General construction of compressive integrity auditing protocol from strong homomorphic encryption scheme

    In the applications of cloud storage, ensuring data’s integrity is an important research problem and kinds of remote integrity auditing protocols...

    **g Song, **yong Chang in Cluster Computing
    Article 06 February 2024
  16. Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage

    Searchable symmetric encryption (SSE) has been introduced for secure outsourcing the encrypted database to cloud storage, while maintaining...

    Qingqing Gan, Joseph K. Liu, ... Jianfeng Wang in Frontiers of Computer Science
    Article 02 April 2022
  17. Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

    With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot....

    Liang Yan, Lina Ge, ... Zheng Hu in Journal of Cloud Computing
    Article Open access 18 April 2023
  18. A novel and secure image encryption scheme based on two-dimensional logistic and Arnold Cat map

    Digital images are information carriers in the latest era of technology. Therefore, securing digital images or kee** data, videos, or confidential...

    Muhammad Akraam, Tabasam Rashid, Sohail Zafar in Cluster Computing
    Article 20 June 2023
  19. CESCAL: A joint compression-encryption scheme based on convolutional autoencoder and logistic map

    In the modern digital world, it is getting harder to share voluminous data with high dimensions, over the internet with adequate security. Images...

    Iram Sabha, Shabir A. Parah, ... Malik Obaid Ul Islam in Multimedia Tools and Applications
    Article 19 September 2023
  20. Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing

    The modern medical system is convergence of cutting-edge technologies and advancements in the healthcare environment. In the modern medical system,...

    Sujoy Roy, Jeet Agrawal, ... Udai Pratap Rao in Cluster Computing
    Article 20 February 2024
Did you find what you were looking for? Share feedback.