EE 418 Fall 2017 : Network Security and Cryptography Project
نویسنده
چکیده
1. Complete both parts of project: 1) Attacks on RFID mutual authentication, and 2) secure RFID system design. 2. Maximum allowed team size is three. Email the names of your group members to the instructor and TA by Monday, October 23. You are welcome to use discussion board to find groups. 3. Submission method: – Submit both project report and source code via Dropbox 4. On the front page of your project report, print: (a) Names and student IDs of team members (b) Clear description of each team member’s contribution 5. Read the reference papers in order to start working on this project.
منابع مشابه
Performance Analysis of Energy-efficient Enhanced Adaptive 3 - Acknowledgement (ee-ea3ack) Using Ecc in Manet
Emerging technology allows the users to access information and services anywhere regardless of their geographic location. Mobile Ad hoc Network is the significant technology among various wireless communication technologies where all the nodes are mobile and which can be connected to dynamically used wireless link in a random manner. The selfconfiguring ability of nodes in MANETs made it popula...
متن کاملDevelopment of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملThe Danger of Data Exfiltration over Social Media Sites
The pervasive utilization of social media sites within both the personal and commercial settings introduce new challenges to the information security sector. Modern network security platforms and procedures fall short in the detection and prevention of this emerging threat. Our research demonstrates new considerations network security professionals must consider when assessing and protecting in...
متن کاملDouble Layer Security Using Visual Cryptography and Transform Based Steganography
With the recent advances in internet computing in our day to day life the need for communication has increased. Privacy in communication is desired when confidential information is shared between two parties. Mainly this project uses transform based steganography (DCT) and visual cryptography for hiding data. The proposed system provides double layer security. First level of security is achieve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017