New Chaotic Information Security Algorithms

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Chaotic Information Security Algorithms

In this paper, new information security algorithms using a Rossler chaotic function are suggested, which contain image encryption, data encryption and data hiding. In designing the image encryption algorithm, a chaotic block was used to change the pixels value using the target pixels in each block. The experiments show that the system performance is improved and the cipher image characteristics...

متن کامل

Information Security Management – A New Paradigm

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that the copies are not made or distributed for profit or commercial advantage, that the copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than SAICSIT or the ACM must be honoured. Abstracting wi...

متن کامل

New thinking about information technology security

This is the last of three related papers exploring how contemporary computer architecture affects security. It brings together the concepts introduced in the earlier papers and presents a generalized approach to protection, isolation, and access control. We call this approach the Generalized Trusted Computing Base. Based upon the “divide and conquer” approach to achieving protection, understand...

متن کامل

Design and Evaluation of Decision Making Algorithms for Information Security

Title of dissertation: DESIGN AND EVALUATION OF DECISION MAKING ALGORITHMS FOR INFORMATION SECURITY Alvaro A. Cárdenas, Doctor of Philosophy, 2006 Dissertation directed by: Professor John S. Baras Department of Electrical and Computer Engineering The evaluation and learning of classifiers is of particular importance in several computer security applications such as intrusion detection systems (...

متن کامل

Histogram based comparison on Symmetric Encryption Algorithms of Information Security

Information sharing and transfer of secured data is a challenging issue in Internet and Network applications, so there is a need to protect such applications. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. There are so many Symmetric Encry...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2013

ISSN: 0975-8887

DOI: 10.5120/12740-9632