Coding for Cryptographic Security Enhancement Using Stopping Sets

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Security Using Cryptographic Techniques

Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level...

متن کامل

Network Security using Firewall and Cryptographic Authentication

The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consi...

متن کامل

Cryptographic Security for Mobile Code

This paper addresses the protection of mobile code against cheating and potentially malicious hosts. We point out that the recent approach based on computing with “encrypted functions” is limited to the case where only the code originator learns the result of the computation and the host running the code must not notice anything at all. We argue that if the host is to receive some output of the...

متن کامل

Data Security Algorithms for Cloud Storage System using Cryptographic Method

Cloud computing paradigm enables the users to access the outsourced data from the cloud server without the hardware and software management. For the effective utilization of sensitive data from CSP, the data owner encrypts before outsourcing to the cloud server. To protect data in cloud, data privacy is the challenging task. In order to address this problem, we proposed an efficient data securi...

متن کامل

Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms

Cloud computing is the next generation architecture, which focuses on IT enterprise, through which potentiality on delivery of services in an infrastructure is increased. By the means of cloud computing investing in new infrastructure, training new personnel and licensing new software descends. It offers the massive storage to the users. It moves the application databases to centralized data ce...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2011

ISSN: 1556-6013,1556-6021

DOI: 10.1109/tifs.2011.2145371