Cryptography and Security

All posts under tag "Cryptography and Security"

160 posts total
Sorted by date
No Image

A Unique One-Time Password Table Sequence Pattern Authentication: Application to Bicol University Union of Federated Faculty Association, Inc. (BUUFFAI) eVoting System

Electronic Voting System (EVS) is a type of voting program that deals primarily with the selection, the casting of votes with embedded security mechanism that detects errors, and the tamper-proof election of results done through the use of an electronic system. It can include optical scan, specializ

Cryptography and Security System Computer Science
No Image

Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging

In many previous works, a single-pixel imaging (SPI) system is constructed as an optical image encryption system. Unauthorized users are not able to reconstruct the plaintext image from the ciphertext intensity sequence without knowing the illumination pattern key. However, little cryptanalysis abou

Computer Vision Image Processing Computer Science Electrical Engineering and Systems Science Cryptography and Security
No Image

Integrating Real-Time Analysis With The Dendritic Cell Algorithm Through Segmentation

As an immune inspired algorithm, the Dendritic Cell Algorithm (DCA) has been applied to a range of problems, particularly in the area of intrusion detection. Ideally, the intrusion detection should be performed in real-time, to continuously detect misuses as soon as they occur. Consequently, the ana

Analysis Neural Computing Artificial Intelligence Computer Science Cryptography and Security
No Image

Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris

Human users have a tough time remembering long cryptographic keys. Hence, researchers, for so long, have been examining ways to utilize biometric features of the user instead of a memorable password or passphrase, in an effort to generate strong and repeatable cryptographic keys. Our objective is to

Computer Vision Cryptography and Security Computer Science
No Image

Transaction Confirmation Time Prediction in Ethereum Blockchain Using Machine Learning

Blockchain offers a decentralized, immutable, transparent system of records. It offers a peer-to-peer network of nodes with no centralised governing entity making it unhackable and therefore, more secure than the traditional paper-based or centralised system of records like banks etc. While there ar

Learning Machine Learning Computer Science Cryptography and Security Statistics Performance
No Image

User Data Sharing Frameworks: A Blockchain-Based Incentive Solution

Currently, there is no universal method to track who shared what, with whom, when and for what purposes in a verifiable way to create an individual incentive for data owners. A platform that allows data owners to control, delete, and get rewards from sharing their data would be an important enabler

Databases Framework Data Computers and Society Computer Science Game Theory Cryptography and Security Performance

< Category Statistics (Total: 5076) >

Electrical Engineering and Systems Science
104
General Relativity
64
General Research
786
HEP-EX
25
HEP-LAT
8
HEP-PH
82
HEP-TH
65
MATH-PH
74
NUCL-EX
6
NUCL-TH
14
Quantum Physics
65

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut