نتایج جستجو برای: biometric cryptosystem
تعداد نتایج: 14652 فیلتر نتایج به سال:
Recently, a new public-key cryptosystem constructed on number elds is presented. The prominent theoretical property of the public-key cryptosystem is a quadratic decryption bit complexity of the public key, which consists of only simple fast arithmetical operations. We call the cryptosystem NICE (New Ideal Coset Encryption). In this paper, we consider practical aspects of the NICE cryptosystem....
the aim of this study was to reveal biometric peculiarities of new zealand white rabbit antebrachium (radius and ulna) by means of three-dimensional (3d) reconstruction of multidetector computed tomography (mdct) images. under general anesthesia, the antebrachiums of a total of sixteen rabbits of both sexes were scanned with a general diagnostic mdct. biometric measurements of the reconstructed...
This paper proposes an efficient joint secret key encryption-channel coding cryptosystem, based on regular Extended Difference Family Quasi-Cyclic Low-Density Parity-Check codes. The key length of the proposed cryptosystem decreases up to 85 percent using a new efficient compression algorithm. Cryptanalytic methods show that the improved cryptosystem has a significant security advantage over Ra...
Telecare medical information systems (TMIS) provides convenient health care services for patients in order to save the patients’ time and expense. The protection of user’s privacy and data security is significant over public communication. Recently, Lu et al. presented a threefactor based authentication protocol using elliptic curve cryptography. In this paper, we analyze the security of Lu et ...
Multimodal biometrics technology that uses more than two sorts of biometrics data has been universally applied for person certification and proof. Researchers have advised that the ear may have benefits over the face for biometric recognition. In this study, a technique for face and ear recognition has suggested. The face image and ear images are prearranged as input. From the pre-processed inp...
Security in the wireless sensor networks (WSNs) is based on using public-key cryptosystems such as RSA cryptosystem to achieve the authentication between wireless sensor nodes and their base station. This cryptosystem has two important problems; (i) the decryption process is slow (ii) it is insecure due to some known attacks such as common modulus attack and low exponent attack. In this paper w...
The ElGamal cryptosystem is the most widely used public key cryptosystem. It uses the discrete logarithm problem as the cryptographic primitive. The MOR cryptosystem is a similar cryptosystem. It uses the discrete logarithm problem in the automorphism group as the cryptographic primitive. In this paper, we study the MOR cryptosystem for finite p-groups. The study is complete for p-automorphisms...
In this paper we break a knapsack based two-lock cryptosystem proposed at ICICS’03 [7]. The two-lock cryptosystem is a commutative encryption algorithm that is very useful for the construction of the general t-out-of-n oblivious transfers and millionaire protocol. However, our analysis shows that the proposed knapsack based two-lock cryptosystem is extremely insecure. The serious flaw is that t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید