Sentence examples for cryptographic data from inspiring English sources

Exact(1)

Blockchain uses specialized hardware to construct sizeable cryptographic data chain, and SHA-256 hash function is used to prevent the tampering of data of third-party users (Tschorsch and Scheuermann 2016).

Similar(59)

The contributions of this paper include: (1) a descriptive language based on a subset of JSON notations; (2) a tool to create and parse a security plan consisting of cryptographic modules, data elements, and mappings of cryptographic modules to the data fields; and (3) a query and data validation mechanism based on the security plan.

Six years ago, Dr. Peter Shor, a researcher at AT&T Labs, galvanized an obscure area of computer science when he published a recipe by which a computer based on the principles of quantum mechanics could break the cryptographic codes protecting data transmissions over the Internet.

This chapter focuses on security and the role played by cryptographic technology in data security.

We employ custom-tailored cryptographic protocols with data packing [4, 7, 8] to reduce the communication and computation costs of using homomorphic encryption.

In this paper we make efforts to analyse both energy and time related characteristics of widely used cryptographic algorithms for data-sensitive embedded real-time systems.

Table 1 Cryptographic notation Notation Meaning Data This indicates that this piece of data is optional, and may not be in the message.

The proposed FPGA-based security module is developed to mitigate information-gathering attacks, which can be made by gaining physical access to the network, e.g., a man-in-the-middle attack, using a cryptographic process to ensure data confidentiality and integrity and prevent injecting malware or malicious data into the critical digital assets of a nuclear power plant data communication system.

But Dr. Noble has endowed the token with another function: the token, not the laptop, holds the master key to the cryptographic process for securing data on the computer.

Secret sharing (SS) is one of the most important cryptographic primitives used for data outsourcing.

An optimal cryptographic support for private data processing must in any case be scalable and lightweight.

Show more...

Ludwig, your English writing platform

Write better and faster with AI suggestions while staying true to your unique style.

Student

Used by millions of students, scientific researchers, professional translators and editors from all over the world!

MitStanfordHarvardAustralian Nationa UniversityNanyangOxford

Since I tried Ludwig back in 2017, I have been constantly using it in both editing and translation. Ever since, I suggest it to my translators at ProSciEditing.

Justyna Jupowicz-Kozak quote

Justyna Jupowicz-Kozak

CEO of Professional Science Editing for Scientists @ prosciediting.com

Get started for free

Unlock your writing potential with Ludwig

Letters

Most frequent sentences: