Applying Encryption Algorithm Practically On M-commerce Background: Observing Security and Crucial Performance

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comments on the security of fast encryption algorithm for multimedia (FEA-M)

We show that the Fast Encryption Algorithm for Multimedia (FEA-w proposed by Yi et a1 is insecure. In particular, we present a simple attack that reduces the key to solving a set of linear equations. The low complexity of the attack combined with its simplicity makes it feasible in many multimedia applications. 11. FEA-M DESCRIPTION FEA-M encrypts 64 x 64 Boolean plaintext matrices using encryp...

متن کامل

turkish-israeli relations and their implication on iranian national security

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

15 صفحه اول

Design for Trust: Security im M-Commerce

For some time it has been predicted that eor m-commerce would become an import business segment with a lot of new services. However, we still have not seen a great deal of cutting-edge applications. Among the reasons for this is the lack of confidence both from the customers as well as from the services providers. The problem is that personal data of the customer, electronic goods or signatures...

متن کامل

Design for Trust: Security in M-Commerce

For some time it has been predicted that eor m-commerce would become an import business segment with a lot of new services. However, we still have not seen a great deal of cutting-edge applications. Among the reasons for this is the lack of confidence both from the customers as well as from the services providers. The problem is that personal data of the customer, electronic goods or signatures...

متن کامل

Policy-Based Security for M-Commerce Networks

With the emergence of the wireless application protocol (WAP Forum, 2000) in 1998, which provided users of mobile devices with an optimized wireless protocol to access the Internet and to browse specific Web content, and with the introduction of specialized wireless programming models such as Java 2 Mobile Edition (J2ME) (Lawton, 2002), the .Net Compact Framework (Neable, 2002), and the Binary ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOSR Journal of Engineering

سال: 2014

ISSN: 2278-8719,2250-3021

DOI: 10.9790/3021-04233037