Abstract: In this article, we present a symmetric surface-potential-based model for dynamic depletion (DD) device operation of silicon-on-insulator (SOI) FETs for RF and analog IC design applications.
Abstract: Federated Learning (FL) is widely used in various industries because it effectively addresses the predicament of isolated data island. However, eavesdroppers is capable of inferring user ...
Abstract: We show how to implement a deniable encryption method from secret sharing. Unlike the related concept of honey encryption, which employs a preprocessing step in symmetric encryption to ...
Abstract: Data Encryption Standard (DES) is a symmetric encryption algorithm that uses a single key to encrypt and decrypt information. In addition, the cipher text will be hidden inside an image ...
Abstract: Due to the advancement of technology, information security and user privacy have become a critical issue resulting in the use of various encryption techniques. Especially with the increasing ...
Abstract: In this paper, we propose a novel Multi-keyword Fuzzy Symmetric Searchable Encryption (SSE) with patterns hidden, namely MFSSE. In MFSSE, the search trapdoor can be modified differently each ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results