Data Security and Cryptographic Techniques: A Review

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Security Using Cryptographic Techniques

Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level...

متن کامل

Cryptographic Techniques for Physical Security (seminar Notes) Cryptographic Techniques for Physical Security (seminar Notes)

Preface The goal of this course is to familiarize participating students with the most important cryptographic techniques and design principles in the context of RFID (Radio Frequency IDentification) security. Unlike most courses and texts on cryptography, our primary focus is not the most traditional application of cryptography — enciphering of (possibly very large) textual messages. Instead, ...

متن کامل

A Modern Review on DNA Cryptographic Techniques

In today’s era as the rate of information storage and transformation is growing day by day; so as information security is becoming more important. To provide security to information there are various types of techniques as traditional cryptographic methods like Substitution techniques, Transposition techniques, hashing Functions and algorithms like DES , RSA, AES, IDEA, ECC etc. are used. DNA c...

متن کامل

the clustering and classification data mining techniques in insurance fraud detection:the case of iranian car insurance

با توجه به گسترش روز افزون تقلب در حوزه بیمه به خصوص در بخش بیمه اتومبیل و تبعات منفی آن برای شرکت های بیمه، به کارگیری روش های مناسب و کارآمد به منظور شناسایی و کشف تقلب در این حوزه امری ضروری است. درک الگوی موجود در داده های مربوط به مطالبات گزارش شده گذشته می تواند در کشف واقعی یا غیرواقعی بودن ادعای خسارت، مفید باشد. یکی از متداول ترین و پرکاربردترین راه های کشف الگوی داده ها استفاده از ر...

Credit scoring in banks and financial institutions via data mining techniques: A literature review

This paper presents a comprehensive review of the works done, during the 2000–2012, in the application of data mining techniques in Credit scoring. Yet there isn’t any literature in the field of data mining applications in credit scoring. Using a novel research approach, this paper investigates academic and systematic literature review and includes all of the journals in the Science direct onli...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Technology Journal

سال: 2003

ISSN: 1812-5638

DOI: 10.3923/itj.2004.106.132