Applied Cryptography and Noise Resistant Data Security
نویسندگان
چکیده
منابع مشابه
Security of classical noise-based cryptography
We examine the security of a protocol on cryptographic key distribution proposed by Yuen and Kim (Yuen H P and Kim A M 1998 Phys. Lett. A 241 135). Theoretical and experimental analysis shows that, even if the eavesdropper can receive more photons than the legitimate receiver, secure key distribution is possible as long as the signal-to-noise ratio of the eavesdropper does not exceed eight time...
متن کاملCryptography for Big Data Security
∗Big Data: Storage, Sharing, and Security. Edited by Fei Hu. Taylor & Francis CRC Press, 2016. https://www.crcpress.com/9781498734868 †MIT Lincoln Laboratory. This work is sponsored by the Assistant Secretary of Defense for Research and Engineering under Air Force Contract #FA8721-05-C-0002. Opinions, interpretations, recommendations and conclusions are those of the authors and are not necessar...
متن کاملNew Media for Teaching Applied Cryptography and Network Security
Considering that security education needs to train students to deal with security problems in real environments, we developed new media for teaching applied cryptography and network security. They permit students to gain real-life security experience from virtual laboratories on CD, DVD, or online. The application of those media is helpful to reduce investment and administration costs as well a...
متن کاملSecurity Solutions and Applied Cryptography in Smart Grid Communications
The University Repository is a digital collection of the research output of the University, available on Open Access. Copyright and Moral Rights for the items on this site are retained by the individual author and/or other copyright owners. Users may access full items free of charge; copies of full text items generally can be reproduced, displayed or performed and given to third parties in any ...
متن کاملApplied Cryptography for Security and Privacy in Wireless Sensor Networks
It is challenging to secure a wireless sensor network (WSN) because its inexpensive, tiny sensor nodes do not have the necessary processing capability, memory capacity, and battery life to take advantage of the existing security solutions for traditional networks. Existing security solutions for wireless sensor networks are mostly based on symmetric key cryptography with the assumption that sen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2018
ISSN: 1939-0114,1939-0122
DOI: 10.1155/2018/3962821