Encryption algorithms are effective in maintaining security

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

Enhancing Security in Palm Print Recognition Systems Using Encryption Algorithms

Nowadays, the use of biometric characteristics (e.g., palmprints, irises, fingerprints) is incrementing for individual recognition and many applications of biometrics are already available. Biometrics recognition has many advantages over the traditionally used methods (e.g., password, smart card), because biometric characteristics cannot be shared or forgotten, as it is inherently associated wi...

متن کامل

Histogram based comparison on Symmetric Encryption Algorithms of Information Security

Information sharing and transfer of secured data is a challenging issue in Internet and Network applications, so there is a need to protect such applications. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. There are so many Symmetric Encry...

متن کامل

Encryption Security in SCADA Networks

Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings’ facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the leve...

متن کامل

Algorithms for Maintaining

We present algorithms for access rights control in multiuser, object-oriented databases. These algorithms follow the model of authorization introduced in 6]. We show how the three basic operations: AccessControl, Grant, and Revoke can be eeciently implemented using techniques for manipulating partially ordered sets. Several techniques for maintenance of authorization bases are presented and the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: BMJ

سال: 1996

ISSN: 0959-8138,1468-5833

DOI: 10.1136/bmj.312.7036.977c