DECRYPTION

作品数:75被引量:69H指数:4
导出分析报告
相关领域:自动化与计算机技术更多>>
相关机构:杭州电子科技大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家高技术研究发展计划中国博士后科学基金The Royal Society更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
A kaleidoscopic hydrogel canvas for information encoding, encryption, and decryption via chemical-induced phase separation
《Science China Materials》2025年第2期571-580,共10页Jun-Bo Hou Yue Zhao 
financial support from the Natural Sciences and Engineering Research Council of Canada (NSERC);le Fonds de recherche du Quebec: Nature et technologies (FRQNT);The Centre Québécois sur les Matériaux Fonctionnels (CQMF);FRQNT and the China Scholarship Council (CSC) for awarding scholarships。
Constructing an information storage or communication system, where countless pieces of information canbe hidden like a canvas and revealed on demand throughspecific stimuli or decoding rules, is significant. In the pr...
关键词:hydrogel canvas chemicals-induced phase separation multistage encryption and decryption self-erasing 
Practical Privacy-Preserving ROI Encryption System for Surveillance Videos Supporting Selective Decryption
《Computer Modeling in Engineering & Sciences》2024年第12期1911-1931,共21页Chan Hyeong Cho Hyun Min Song Taek-Young Youn 
supported by the Institute of Information and Communications Technology Planning and Evaluation (IITP)funded by the Korea Government (MIST),Development of Collection and Integrated Analysis Methods of Automotive Inter and Intra System Artifacts through Construction of Event-Based Experimental System,under RS-2022-II221022.
With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable assets.This paper proposes a novel system for encrypting personal information within recor...
关键词:Privacy de-identification selective decryption surveillance video 
On the Security of Homomorphic Encryption Schemes with Restricted Decryption Oracles
《Journal of Systems Science & Complexity》2024年第5期2240-2261,共22页MA Guangsheng LI Hongbo 
partially supported by China National Key Research and Development Projects under Grant Nos.2020YFA0712300 and 2018YFA0704705。
Fully homomorphic encryption(FHE)can be used for privacy-preserving aggregation of medical data.In this typical application,the security against passive attacks has been well studied by Li and Micciancio(2021).In this...
关键词:Homomorphic encryption PRIVACY secure cloud computing SECURITY 
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
《Computers, Materials & Continua》2024年第3期4417-4452,共36页Fauziyah Zhaoshun Wang Mujahid Tabassum 
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method...
关键词:CRYPTOGRAPHIC SECURITY privacy preservation DECRYPTION INTEGRITY 
Secure android IoT mobile and collaborative machine learning for controlling the management of enterprise
《Journal of Control and Decision》2024年第1期15-25,共11页Hamza Mohammed Ridha Al-Khafaji Refed Adnan Jaleel 
There is a need for increased security measures because of wide variety of android Internet of Thing(IoT)mobile devices that can communicate with each other via networks for controlling the management of enterprise.El...
关键词:IOT ECDH RSA CML ANDROID ENCRYPTION DECRYPTION 
Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange
《Journal of Computer and Communications》2024年第2期201-210,共10页Pawan Kumar Vipin Saxena 
Data security is a very important part of data transmission over insecure channels connected through high-speed networks. Due to COVID-19, the use of data transmission over insecure channels has increased in an expone...
关键词:ENCRYPTION DECRYPTION DNA Paillier Cryptography Nested Levels Hybrid Cryptography 
Excitation-wavelength-dependent fluorescent organohydrogel for dynamic information anti-counterfeiting被引量:3
《Chinese Chemical Letters》2023年第11期180-183,共4页Dong Guo Xiaoxia Le Hui Shang Fuqing Shan Danyang Li Chunfa Ouyang Tao Chen 
supported by the National Key R&D Program of China(No.2022YFB3204300);the National Natural Science Foundation of China(No.52103246);Zhejiang Provincial Natural Science Foundation,China(No.LQ22E030015);Natural Science Foundation of Ningbo,China(No.20221JCGY010301).
Anti-counterfeiting labels with various fluorescent colors are of great importance in information encryption-decryption,but are still limited to static information display.Therefore,it is urgent to develop new materia...
关键词:Fluorescent organohydrogel ANTI-COUNTERFEITING Stimulus responsive Encryption-decryption Dynamic fluorescence 
Air target recognition method against ISRJ for radio frequency proximity sensors using chaotic stream encryption
《Defence Technology(防务技术)》2023年第10期267-279,共13页Jian-feng Li Jian Dai Xin-hong Hao Xiao-peng Yan Xin-wei Wang 
supported by the National Natural Science Foundation of China(Grant No.61973037)and(Grant No.61871414);Postdoctoral Fundation of China(Grant No.2022M720419)。
The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article propose...
关键词:Interrupted-sampling repeater jamming(ISRJ) Radio frequency proximity sensors(RFPS) Chaotic stream encryption Air target recognition Identity(ID)decryption 
Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
《Computer Systems Science & Engineering》2023年第7期1079-1092,共14页P.Prathap Nayudu Krovi Raja Sekhar 
The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of t...
关键词:Cloud computing access policy CP-ABE hash code SHA-512 ATTRIBUTE CIPHERTEXT encryption DECRYPTION 
Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation被引量:1
《Science China(Information Sciences)》2023年第7期126-142,共17页Dilxat GHOPUR Jianfeng MA Xindi MA Yinbin MIAO Jialu HAO Tao JIANG 
supported by National Key Research and Development Program of China(Grant No.2021YFB3101100);National Natural Science Foundation of China(Grant Nos.61902290,62072352);Key Research and Development Program of Shaanxi(Grant Nos.2020ZDLGY09-06,2019ZDLGY12-04);Guangxi Key Laboratory of Trusted Software(Grant No.kx202004)。
With the rapid deployment of storage services,secure and efficient user authorization and revocation data shared through the cloud have become a grand challenge hindering cloud data applications.When previous direct a...
关键词:ciphertext-policy attribute-based encryption puncturable encryption user revocation outsource decryption digital signature 
检索报告 对象比较 聚类工具 使用帮助 返回顶部