Applying Encryption Algorithm Practically On M-commerce Background: Observing Security and Crucial Performance
نویسندگان
چکیده
منابع مشابه
Comments on the security of fast encryption algorithm for multimedia (FEA-M)
We show that the Fast Encryption Algorithm for Multimedia (FEA-w proposed by Yi et a1 is insecure. In particular, we present a simple attack that reduces the key to solving a set of linear equations. The low complexity of the attack combined with its simplicity makes it feasible in many multimedia applications. 11. FEA-M DESCRIPTION FEA-M encrypts 64 x 64 Boolean plaintext matrices using encryp...
متن کاملturkish-israeli relations and their implication on iranian national security
this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...
15 صفحه اولDesign for Trust: Security im M-Commerce
For some time it has been predicted that eor m-commerce would become an import business segment with a lot of new services. However, we still have not seen a great deal of cutting-edge applications. Among the reasons for this is the lack of confidence both from the customers as well as from the services providers. The problem is that personal data of the customer, electronic goods or signatures...
متن کاملDesign for Trust: Security in M-Commerce
For some time it has been predicted that eor m-commerce would become an import business segment with a lot of new services. However, we still have not seen a great deal of cutting-edge applications. Among the reasons for this is the lack of confidence both from the customers as well as from the services providers. The problem is that personal data of the customer, electronic goods or signatures...
متن کاملPolicy-Based Security for M-Commerce Networks
With the emergence of the wireless application protocol (WAP Forum, 2000) in 1998, which provided users of mobile devices with an optimized wireless protocol to access the Internet and to browse specific Web content, and with the introduction of specialized wireless programming models such as Java 2 Mobile Edition (J2ME) (Lawton, 2002), the .Net Compact Framework (Neable, 2002), and the Binary ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOSR Journal of Engineering
سال: 2014
ISSN: 2278-8719,2250-3021
DOI: 10.9790/3021-04233037