Results for 'AES Encryption'

25 found
Order:
  1. Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a large-scale cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Ambiguous encryption implies that consciousness cannot be simulated.Anna Wegloop & Peter Vach - manuscript
    Here we show, based on a simplified version of fully homomorphic encryption, that it is not possible to simulate conscious experience, in the sense of using a computer algorithm to generate experiences that are indistinguishable from those of a particular typical human being. This seems to have important implications for questions in the context of future developments in artificial intelligence. For example, the proposed process of mind-uploading will in general not generate a virtual consciousness similar to the consciousness of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  3. AE Galeotti, La tolleranza. Una proposta pluralista. [REVIEW]Sergio Volodia Marcello Cremaschi - 1997 - Rivista di Filosofia Neo-Scolastica 89 (2-3):493-495.
    Download  
     
    Export citation  
     
    Bookmark  
  4. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re- (...) keys are only issued to legitimate users. An in depth analysis shows that our scheme is secure, flexible and efficient for mobile cloud computing. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  5. A Review on Biometric Encryption System in Cloud Computing.Xiufeng Liu, Sheraz Arshad, Nosheen Nazir, Mubeen Fatima & Mahreen Mahi - 2018 - International Journal of Computer Science and Network Solutions 6 (1).
    This Review paper is about the security of bio metric templates in cloud databases. Biometrics is proved to be the best authentication method. However, the main concern is the security of the biometric template, the process to extract and stored in the database within the same database along with many other. Many techniques and methods have already been proposed to secure templates, but everything comes with its pros and cons, this paper provides a critical overview of these issues and solutions.
    Download  
     
    Export citation  
     
    Bookmark  
  6. Implications of computer science theory for the simulation hypothesis.David Wolpert - manuscript
    The simulation hypothesis has recently excited renewed interest, especially in the physics and philosophy communities. However, the hypothesis specifically concerns {computers} that simulate physical universes, which means that to properly investigate it we need to couple computer science theory with physics. Here I do this by exploiting the physical Church-Turing thesis. This allows me to introduce a preliminary investigation of some of the computer science theoretic aspects of the simulation hypothesis. In particular, building on Kleene's second recursion theorem, I prove (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. A Refutation of Goodman's Type‐Token Theory of Notation.John Dilworth - 2003 - Dialectica 57 (3):330-336.
    In Languages of Art, Nelson Goodman presents a general theory of symbolic notation. However, I show that his theory could not adequately explain possible cases of natural language notational uses, and argue that this outcome undermines, not only Goodman's own theory, but any broadly type versus token based account of notational structure.Given this failure, an alternative representational theory is proposed, in which different visual or perceptual aspects of a given physical inscription each represent a different letter, word, or other notational (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  8. Artificial Evil and the Foundation of Computer Ethics.Luciano Floridi & J. W. Sanders - 2001 - Springer Netherlands. Edited by Luciano Floridi & J. W. Sanders.
    Moral reasoning traditionally distinguishes two types of evil:moral (ME) and natural (NE). The standard view is that ME is the product of human agency and so includes phenomena such as war,torture and psychological cruelty; that NE is the product of nonhuman agency, and so includes natural disasters such as earthquakes, floods, disease and famine; and finally, that more complex cases are appropriately analysed as a combination of ME and NE. Recently, as a result of developments in autonomous agents in cyberspace, (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  9. Artificial evil and the foundation of computer ethics.L. Floridi & J. Sanders - 2000 - Etica E Politica 2 (2).
    Moral reasoning traditionally distinguishes two types of evil: moral and natural. The standard view is that ME is the product of human agency and so includes phenomena such as war, torture and psychological cruelty; that NE is the product of nonhuman agency, and so includes natural disasters such as earthquakes, floods, disease and famine; and finally, that more complex cases are appropriately analysed as a combination of ME and NE. Recently, as a result of developments in autonomous agents in cyberspace, (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  10. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and servers. An (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. OAE: The Ontology of Adverse Events.Yongqun He, Sirarat Sarntivijai, Yu Lin, Zuoshuang Xiang, Abra Guo, Shelley Zhang, Desikan Jagannathan, Luca Toldo, Cui Tao & Barry Smith - 2014 - Journal of Biomedical Semantics 5 (29):1-13.
    A medical intervention is a medical procedure or application intended to relieve or prevent illness or injury. Examples of medical interventions include vaccination and drug administration. After a medical intervention, adverse events (AEs) may occur which lie outside the intended consequences of the intervention. The representation and analysis of AEs are critical to the improvement of public health. Description: The Ontology of Adverse Events (OAE), previously named Adverse Event Ontology (AEO), is a community-driven ontology developed to standardize and integrate data (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  12. Conscientious Refusal of Abortion in Emergency Life-Threatening Circumstances and Contested Judgments of Conscience.Wojciech Ciszewski & Tomasz Żuradzki - 2018 - American Journal of Bioethics 18 (7):62-64.
    Lawrence Nelson (2018) criticizes conscientious objection (CO) to abortion statutes as far as they permit health care providers to escape criminal liability for what would otherwise be the legally wrongful taking of a pregnant woman’s life by refusing treatment (i.e. abortion). His key argument refers to the U.S. Supreme Court judgment (Roe v. Wade 1973) that does not treat the unborn as constitutional persons under the Fourteenth Amendment. Therefore, Nelson claims that within the U.S. legal system any vital interests of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. The Role of Information in Consciousness.Harry Haroutioun Haladjian - forthcoming - Psychology of Consciousness: Theory, Research, and Practice.
    This article comprehensively examines how information processing relates to attention and consciousness. We argue that no current theoretical framework investigating consciousness has a satisfactory and holistic account of their informational relationship. Our key theoretical contribution is showing how the dissociation between consciousness and attention must be understood in informational terms in order to make the debate scientifically sound. No current theories clarify the difference between attention and consciousness in terms of information. We conclude with two proposals to advance the debate. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Relativized Essentialism about Modalities.Salim Hirèche - 2022 - Argumenta 7 (2):463-484.
    On what I call absolutist essentialism about modality (AE), the metaphysical necessities are the propositions that are true in virtue of the essence (i.e. Aristotelian, absolute essence) of some entities. Other kinds of necessity can then be defined by restriction – e.g. the conceptual necessities are the propositions that are true in virtue of the essence of conceptual entities specifically. As an account of metaphysical modality and some other kinds (e.g. logical, conceptual), AE may have important virtues. However, when it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Un problema abierto de independencia en la teoría de conjuntos relacionado con ultrafiltros no principales sobre el conjunto de los números naturales N, y con Propiedades Ramsey.Franklin Galindo - manuscript
    En el ámbito de la lógica matemática existe un problema sobre la relación lógica entre dos versiones débiles del Axioma de elección (AE) que no se ha podido resolver desde el año 2000 (aproximadamente). Tales versiones están relacionadas con ultrafiltros no principales y con Propiedades Ramsey (Bernstein, Polarizada, Subretículo, Ramsey, Ordinales flotantes, etc). La primera versión débil del AE es la siguiente (A): “Existen ultrafiltros no principales sobre el conjunto de los números naturales (ℕ)”. Y la segunda versión débil del (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Whispers and Shouts. The measurement of the human act.Fernando Flores Morador & Luis de Marcos Ortega (eds.) - 2021 - Alcalá de Henares, Madrid: Departement of Computational Sciences. University of Alcalá; Madrid.
    The 20th Century is the starting point for the most ambitious attempts to extrapolate human life into artificial systems. Norbert Wiener’s Cybernetics, Claude Shannon’s Information Theory, John von Neumann’s Cellular Automata, Universal Constructor to the Turing Test, Artificial Intelligence to Maturana and Varela’s Autopoietic Organization, all shared the goal of understanding in what sense humans resemble a machine. This scientific and technological movement has embraced all disciplines without exceptions, not only mathematics and physics but also biology, sociology, psychology, economics etc. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. The Importance of Alternative Solar Energy Sources and the Advantages and Disadvantages of Using Solar Panels in this Process.Tulakov Jakhongir Turakul Ugli - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (4):70-79.
    Abstract: This article reviews and analyzes the advantages and disadvantages of alternative solar energy and the use of solar panels in this process. The solar energy that is falling on the photoelements under a certain angle depends on environmental climax, season, and location. Atmospheric changes also lead to changes in the transverse and direct rays of light, which does not change the light, spectrum and intensity of falling light. These changes will change the principle of operation of the QES. Also, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. The Flying Termite.Laszlo Katona (ed.) - 2014 - Vernon Press.
    ABSTRACT of The Flying Termite by L.L. Katona -/- In this book I would like to show the term “intelligence“ has a universal, non-anthropomorphic meaning. We can perceive intelligence in dogs, dolphins or gorillas without understanding of it, but intelligence can be also seen in many other things from insects and the Solar System to elementary particles or the rules of a triangle. But that doesn’t mean intelligence comes from Intelligent Design, yet alone a Designer, they seems to be the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Droit de la robotique: Livre blanc.Alain Bensoussan & Renaud Champion - 2016 - SYMOP.
    Histoire et utilisation du robot Bien que la robotique soit un marché économique relativement jeune et en pleine croissance, la genèse des robots remonte à l’Antiquité. Le premier robot à être déployé sur des lignes d’assemblage est Unimate, utilisé dès 1961 par General Motors. La robotique, en se di usant dans tous les pans de notre économie, va impacter les business modèles de nombreuses industries comme l’automobile et l’aéronautique mais aussi la construction ou l’agriculture. Aujourd’hui les robots industriels et de (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. The Importance of Alternative Solar Energy Sources and the Advantages and Disadvantages of Using Solar Panels in this Process.Tulakov Jakhongir Turakul Ugli - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (4):70-78.
    Abstract: This article reviews and analyzes the advantages and disadvantages of alternative solar energy and the use of solar panels in this process. The solar energy that is falling on the photoelements under a certain angle depends on environmental climax, season, and location. Atmospheric changes also lead to changes in the transverse and direct rays of light, which does not change the light, spectrum and intensity of falling light. These changes will change the principle of operation of the QES. Also, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Nicholas Rescher, Leibniz and Cryptography: An Account on the Occasion of the Initial Exhibition of the Reconstruction of Leibniz’s Cipher Machine. [REVIEW]Stephen Puryear - 2014 - Review of Metaphysics 67 (4):882-884.
    In Part 1 of this short book, Rescher provides an overview of the nature and source of Leibniz’s interest in the theory and practice of cryptanalysis, including his unsuccessful bid to secure an apprentice for John Wallis (1616-1703) with a view to perpetuating the Englishman’s remarkable deciphering abilities. In Part 2, perhaps the most interesting part of the book, Rescher offers his account of the inner workings of Leibniz’s cipher machine. Part 3 provides a brief pictorial history of such machines (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Getting It: On Jokes and Art.Steven Burns & Alice MacLachlan - 2004 - AE: Journal of the Canadian Society of Aesthetics 10.
    “What is appreciation?” is a basic question in the philosophy of art, and the analogy between appreciating a work of art and getting a joke can help us answer it. We first propose a subjective account of aesthetic appreciation (I). Then we consider jokes (II). The difference between getting a joke and not, or what it is to get it right, can often be objectively articulated. Such explanations cannot substitute for the joke itself, and indeed may undermine the very power (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Does Contemporary Art Have Cognitive Value?Sherri Irvin - 2003 - AE: Canadian Aesthetics Journal 8.
    In his book Art and Knowledge, James O. Young suggests that avant-garde and contemporary art, because it tends to eschew the resources of illustrative representation, lacks cognitive value. Because he regards cognitive value as a necessary condition for a high degree of aesthetic value, he concludes that contemporary works tend to have little aesthetic value and thus do not deserve to be regarded as valuable artworks (or, in many cases, as artworks at all). In this paper, I mount a defense (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. The Dynamics of Argumentative Discourse.Carlotta Pavese & Alexander W. Kocurek - 2022 - Journal of Philosophical Logic 51 (2):413-456.
    Arguments have always played a central role within logic and philosophy. But little attention has been paid to arguments as a distinctive kind of discourse, with its own semantics and pragmatics. The goal of this essay is to study the mechanisms by means of which we make arguments in discourse, starting from the semantics of argument connectives such as `therefore'. While some proposals have been made in the literature, they fail to account for the distinctive anaphoric behavior of `therefore', as (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations