|
|
|
Md Momin Al Aziz, Md Toufique Morshed Tamal and Noman Mohammed
Fully homomorphic encryption (FHE) cryptographic systems enable limitless computations over encrypted data, providing solutions to many of today?s data security problems. While effective FHE platforms can address modern data security concerns in unsecure...
ver más
|
|
|
|
|
|
|
Erman Ozpolat and Arif Gulten
This paper explores the synchronization and implementation of a novel hyperchaotic system using an adaptive observer. Hyperchaotic systems, known for possessing a greater number of positive Lyapunov exponents compared to chaotic systems, present unique c...
ver más
|
|
|
|
|
|
|
Eduardo Juarez-Mendoza, Francisco Asahel del Angel-Diaz, Alejandro Diaz-Sanchez and Esteban Tlelo-Cuautle
This manuscript shows the CMOS design of Lorenz systems using operational transconductance amplifiers (OTAs). Two Lorenz systems are then synchronized in a master?slave topology and used to implement a CMOS secure communication system. The contribution i...
ver más
|
|
|
|
|
|
|
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi...
ver más
|
|
|
|
|
|
|
Xingchen Wang and Peng Li
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat...
ver más
|
|
|
|
|
|
|
Jih-Ching Chiu, Guan-Yi Lee, Chih-Yang Hsieh and Qing-You Lin
In computer vision and image processing, the shift from traditional cameras to emerging sensing tools, such as gesture recognition and object detection, addresses privacy concerns. This study navigates the Integrated Sensing and Communication (ISAC) era,...
ver más
|
|
|
|
|
|
|
Qasem Abu Al-Haija and Ahmed Al-Tamimi
Automatic dependent surveillance-broadcast (ADS-B) is the future of aviation surveillance and traffic control, allowing different aircraft types to exchange information periodically. Despite this protocol?s advantages, it is vulnerable to flooding, denia...
ver más
|
|
|
|
|
|
|
Radheshyam Singh, Leo Mendiboure, José Soler, Michael Stübert Berger, Tidiane Sylla, Marion Berbineau and Lars Dittmann
In the near future, there will be a greater emphasis on sharing network resources between roads and railways to improve transportation efficiency and reduce infrastructure costs. This could enable the development of global Cooperative Intelligent Transpo...
ver más
|
|
|
|
|
|
|
Bing Su and Jiwu Liang
With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and sec...
ver más
|
|
|
|
|
|
|
Muhammad Bin Saif, Sara Migliorini and Fausto Spoto
Blockchain technology has been successfully applied in recent years to promote the immutability, traceability, and authenticity of previously collected and stored data. However, the amount of data stored in the blockchain is usually limited for economic ...
ver más
|
|
|
|