Computer Science / Cryptography and Security

All posts under category "Computer Science / Cryptography and Security"

147 posts total
Sorted by date
No Image

Integrating Real-Time Analysis With The Dendritic Cell Algorithm Through Segmentation

As an immune inspired algorithm, the Dendritic Cell Algorithm (DCA) has been applied to a range of problems, particularly in the area of intrusion detection. Ideally, the intrusion detection should be performed in real-time, to continuously detect misuses as soon as they occur. Consequently, the ana

Analysis Neural Computing Artificial Intelligence Computer Science Cryptography and Security
No Image

Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris

Human users have a tough time remembering long cryptographic keys. Hence, researchers, for so long, have been examining ways to utilize biometric features of the user instead of a memorable password or passphrase, in an effort to generate strong and repeatable cryptographic keys. Our objective is to

Computer Vision Cryptography and Security Computer Science
No Image

Transaction Confirmation Time Prediction in Ethereum Blockchain Using Machine Learning

Blockchain offers a decentralized, immutable, transparent system of records. It offers a peer-to-peer network of nodes with no centralised governing entity making it unhackable and therefore, more secure than the traditional paper-based or centralised system of records like banks etc. While there ar

Learning Machine Learning Computer Science Cryptography and Security Statistics Performance
No Image

User Data Sharing Frameworks: A Blockchain-Based Incentive Solution

Currently, there is no universal method to track who shared what, with whom, when and for what purposes in a verifiable way to create an individual incentive for data owners. A platform that allows data owners to control, delete, and get rewards from sharing their data would be an important enabler

Databases Framework Data Computers and Society Computer Science Game Theory Cryptography and Security Performance
A secure approach for embedding message text on an elliptic curve   defined over prime fields, and building EC-RSA-ELGamal Cryptographic System

A secure approach for embedding message text on an elliptic curve defined over prime fields, and building EC-RSA-ELGamal Cryptographic System

This paper presents a new probabilistic approach to embedding message text on an elliptic curve, by using the concept of the RSA Algorithm and its security, and such approach allows us discovering the message from the point, only according to the security of the RSA Algorithm. By mixing between the

Computer Science Cryptography and Security System

< Category Statistics (Total: 5017) >

General Relativity
66
General Research
781
HEP-EX
25
HEP-LAT
7
HEP-PH
79
HEP-TH
67
MATH-PH
79
NUCL-EX
6
NUCL-TH
14
Quantum Physics
67

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut