Geo Security using GPT Cryptosystem

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modified GPT Cryptosystem for Information Network Security

To provide information security in network we use the public key GPT (Gabidulin–Paramonov–Tretiyakov) cryptosystem based on rank codes. This cryptosystem was the subject of several attacks. Some of them were structural attacks, others were decoding attacks. In our opinion the most dangerous are structural attacks because decoding attacks can be prevented by proper choice of parameters. To preve...

متن کامل

Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem

A generalized group-oriented cryptosystem (GGOC) based on ElGamal cryptosystem was proposed by Yang et al. in 2003. This study shows that if the authorized decryption sets of users are not properly predetermined in Yang et al.’s GGOC, an unauthorized decryption set of users can recover the encrypted message without difficulty. This study also presents an improved protocol to resist such an attack.

متن کامل

Biometric Cryptosystem for VoIP Security using RSA Key Generation

-This paper presents a narrative key generation scheme using biometric methodology for providing high security over the internet applications such as VoIP technology. The present work deals with modern computing systems security issues, focusing on biometric based asymmetric key generation process. The term VoIP refers-“voice over internet protocol (IP)” in which the “voice” to be transmitted u...

متن کامل

Improving e-payment security using Elliptic Curve Cryptosystem

The use of e-commerce has been associated with a lot of skepticism and apprehension due to some crimes associated with e-commerce and specifically to payment systems. The secure socket layer (SSL) protocol is trusted in this regard to secure transactions for sensitive applications like e-commerce. Unfortunately, the use of SSL protocol causes slow response time on the server which is a major ca...

متن کامل

Energy/security scalable mobile cryptosystem

Time-sensitive mobile commerce is vulnerable to message authentication delays. Significant power consumption incurred by cryptography is another limiting factor of most mobile devices. In this paper, we present a scalable mobile cryptosystem, which installs a group key and an elliptic curve private/public key pair in each device to enable both symmetric key and public key cryptography. We propo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2020

ISSN: 2156-5570,2158-107X

DOI: 10.14569/ijacsa.2020.0110265