Applied Cryptography and Noise Resistant Data Security

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security of classical noise-based cryptography

We examine the security of a protocol on cryptographic key distribution proposed by Yuen and Kim (Yuen H P and Kim A M 1998 Phys. Lett. A 241 135). Theoretical and experimental analysis shows that, even if the eavesdropper can receive more photons than the legitimate receiver, secure key distribution is possible as long as the signal-to-noise ratio of the eavesdropper does not exceed eight time...

متن کامل

Cryptography for Big Data Security

∗Big Data: Storage, Sharing, and Security. Edited by Fei Hu. Taylor & Francis CRC Press, 2016. https://www.crcpress.com/9781498734868 †MIT Lincoln Laboratory. This work is sponsored by the Assistant Secretary of Defense for Research and Engineering under Air Force Contract #FA8721-05-C-0002. Opinions, interpretations, recommendations and conclusions are those of the authors and are not necessar...

متن کامل

New Media for Teaching Applied Cryptography and Network Security

Considering that security education needs to train students to deal with security problems in real environments, we developed new media for teaching applied cryptography and network security. They permit students to gain real-life security experience from virtual laboratories on CD, DVD, or online. The application of those media is helpful to reduce investment and administration costs as well a...

متن کامل

Security Solutions and Applied Cryptography in Smart Grid Communications

The University Repository is a digital collection of the research output of the University, available on Open Access. Copyright and Moral Rights for the items on this site are retained by the individual author and/or other copyright owners. Users may access full items free of charge; copies of full text items generally can be reproduced, displayed or performed and given to third parties in any ...

متن کامل

Applied Cryptography for Security and Privacy in Wireless Sensor Networks

It is challenging to secure a wireless sensor network (WSN) because its inexpensive, tiny sensor nodes do not have the necessary processing capability, memory capacity, and battery life to take advantage of the existing security solutions for traditional networks. Existing security solutions for wireless sensor networks are mostly based on symmetric key cryptography with the assumption that sen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2018

ISSN: 1939-0114,1939-0122

DOI: 10.1155/2018/3962821