Between the changing Industry 4.0 landscape and the rise of Industry 5.0, where human intelligence and intelligent machines work together, vast amounts of privacy-sensitive data …
Abstract Properties of redundant residue number system (RRNS) are used for detecting and correcting errors during the data storing, processing and transmission. However, detection …
Y Yang, F Chen, J Chen, Y Zhang… - Enterprise Information …, 2019 - Taylor & Francis
Rapid growth of internet data has created enormous security challenges on authenticity, availability and integrity protection of these outsourced data. Hash function is one of the …
Abstract Data Outsourcing in Cloud (DOC) has its exclusive benefits like low-cost, lower management overhead, elasticity of storage etc and these encourage organizations to use …
NN Shenets - Journal of Computer Virology and Hacking Techniques, 2024 - Springer
Secret sharing scheme (SSS) allows to share some secret s among n parties in such a way that only certain subsets of them can recover the secret. The first SSSs were independently …
Online social media networks have revolutionized the way information is shared across our societies and around the world. Information is now delivered for free to a large audience …
When designing and using distributed storage systems with cloud technology, the security issues become crucial. One of the promising mechanisms is the computationally secure …
The secret sharing is a method to protect confidentiality and integrity of the secret messages by distributing the message shares into several recipients. The secret message could not be …
K Zekeriya, S SOLAK - Journal on Mathematic, Engineering and Natural …, 2022 - ejons.org
Özet İnternet kullanımının artmasıyla doğru orantılı olarak bilgi akışında artış yaşanmıştır. Bu durum sonucunda bilginin, siber saldırılara ve güvenlik zafiyetlerine karşı korunma ihtiyacı …