Sign Up to like & get
recommendations!
1
Published in 2022 at "Advanced Science"
DOI: 10.1002/advs.202206290
Abstract: Exploring high‐safety but convenient encryption and decryption technologies to combat threats of information leakage is urgently needed but remains a great challenge. Here, a synergistically time‐ and temperature‐resolved information coding/decoding solution based on functional photonic…
read more here.
Keywords:
information;
time;
decryption;
encryption ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
1
Published in 2020 at "Wireless Personal Communications"
DOI: 10.1007/s11277-020-07503-y
Abstract: Attribute based encryption is an effective method which can solve the access control problem of cloud storage. Realizing both efficient attributes revocation and outsourcing decryption would enhance mobile user experience. In this paper, we present…
read more here.
Keywords:
system;
decryption;
flexible abe;
mobile user ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Wireless Personal Communications"
DOI: 10.1007/s11277-020-07540-7
Abstract: Deep space network is a must-have technology to improve communication, navigation, and propulsion in future space missions, a very long physical distance among space entities is difficult to overcome efficiently as a space mission could…
read more here.
Keywords:
space;
reliable end;
decryption;
end end ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Optics Communications"
DOI: 10.1016/j.optcom.2018.12.049
Abstract: Abstract We present general volume holographic encryption and decryption system by means of two wave mixing process that can apply to variety of diffraction domains, including the conventional Fourier hologram domain (using 4f-optical processor), the…
read more here.
Keywords:
encryption decryption;
volume holographic;
decryption;
photorefractive linbo3 ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "ACS applied materials & interfaces"
DOI: 10.1021/acsami.1c22745
Abstract: Information camouflage and decryption on hydrogels rely on chemical stimuli such as pH, ultraviolet light, and chemical reactions, in which the cyclability is limited. This work develops a simpler yet effective physical method that can…
read more here.
Keywords:
information;
decryption;
camouflage;
information camouflage ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2902040
Abstract: Since cloud computing has been playing an increasingly important role in real life, the privacy protection in many fields has been paid more and more attention, especially, in the field of personal health record (PHR).…
read more here.
Keywords:
access;
decryption;
policy;
personal health ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2907364
Abstract: The notion of attribute-based encryption with outsourced decryption (OD-ABE) was proposed by Green, Hohenberger, and Waters. In OD-ABE, the ABE ciphertext is converted to a partially-decrypted ciphertext that has a shorter bit length and a…
read more here.
Keywords:
decryption;
attribute based;
generic approach;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Journal on Selected Areas in Communications"
DOI: 10.1109/jsac.2020.3020656
Abstract: The rapid development of the Internet of Things (IoT) has led to the emergence of more and more novel applications in recent years. One of them is the e-health system, which can provide people with…
read more here.
Keywords:
system;
health;
decryption;
personal health ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Sensors Journal"
DOI: 10.1109/jsen.2023.3265777
Abstract: In recent years, several industries have increased their demand for processing precision, automatic detection, and visualization interfaces. Therefore, to keep pace with the fourth industrial revolution, machine tool operators install a large number of sensors…
read more here.
Keywords:
system;
wireless;
decryption;
machine ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Transactions on Cloud Computing"
DOI: 10.1109/tcc.2017.2754255
Abstract: Fine grained access control is a requirement for data stored in untrusted servers like clouds. Owing to the large volume of data, decentralized key management schemes are preferred over centralized ones. Often encryption and decryption…
read more here.
Keywords:
access;
decryption;
attribute based;
decentralized attribute ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "International Journal of Electrical and Computer Engineering"
DOI: 10.11591/ijece.v11i5.pp4221-4232
Abstract: In this research work, a fast and lightweight AES-128 cypher based on the Xilinx ZCU102 FPGA board is presented, suitable for 5G communications. In particular, both encryption and decryption algorithms have been developed using a…
read more here.
Keywords:
encryption decryption;
aes 128;
decryption;
performance aes ... See more keywords