نتایج جستجو برای: biometric cryptosystem

تعداد نتایج: 14652  

1999
Michael Hartmann Sachar Paulus Tsuyoshi Takagi

Recently, a new public-key cryptosystem constructed on number elds is presented. The prominent theoretical property of the public-key cryptosystem is a quadratic decryption bit complexity of the public key, which consists of only simple fast arithmetical operations. We call the cryptosystem NICE (New Ideal Coset Encryption). In this paper, we consider practical aspects of the NICE cryptosystem....

Journal: :iranian journal of veterinary research 2015
s. özkadif e. eken k. beşoluk m. o. dayan

the aim of this study was to reveal biometric peculiarities of new zealand white rabbit antebrachium (radius and ulna) by means of three-dimensional (3d) reconstruction of multidetector computed tomography (mdct) images. under general anesthesia, the antebrachiums of a total of sixteen rabbits of both sexes were scanned with a general diagnostic mdct. biometric measurements of the reconstructed...

Journal: :Bulletin of Electrical Engineering and Informatics 2015

2011
Reza Hooshmand Taraneh Eghlidos Mohammad Reza Aref

This paper proposes an efficient joint secret key encryption-channel coding cryptosystem, based on regular Extended Difference Family Quasi-Cyclic Low-Density Parity-Check codes. The key length of the proposed cryptosystem decreases up to 85 percent using a new efficient compression algorithm. Cryptanalytic methods show that the improved cryptosystem has a significant security advantage over Ra...

Journal: :I. J. Network Security 2017
Lidong Han Qi Xie Wenhao Liu

Telecare medical information systems (TMIS) provides convenient health care services for patients in order to save the patients’ time and expense. The protection of user’s privacy and data security is significant over public communication. Recently, Lu et al. presented a threefactor based authentication protocol using elliptic curve cryptography. In this paper, we analyze the security of Lu et ...

2014
G. Radhamani G. R. Damodaran

Multimodal biometrics technology that uses more than two sorts of biometrics data has been universally applied for person certification and proof. Researchers have advised that the ear may have benefits over the face for biometric recognition. In this study, a technique for face and ear recognition has suggested. The face image and ear images are prearranged as input. From the pre-processed inp...

2008
Tamer M. Barakat Amr M. Gody Amin M. Nassar

Security in the wireless sensor networks (WSNs) is based on using public-key cryptosystems such as RSA cryptosystem to achieve the authentication between wireless sensor nodes and their base station. This cryptosystem has two important problems; (i) the decryption process is slow (ii) it is insecure due to some known attacks such as common modulus attack and low exponent attack. In this paper w...

Journal: :CoRR 2013
Ayan Mahalanobis

The ElGamal cryptosystem is the most widely used public key cryptosystem. It uses the discrete logarithm problem as the cryptographic primitive. The MOR cryptosystem is a similar cryptosystem. It uses the discrete logarithm problem in the automorphism group as the cryptographic primitive. In this paper, we study the MOR cryptosystem for finite p-groups. The study is complete for p-automorphisms...

2004
Bin Zhang Hongjun Wu Dengguo Feng Feng Bao

In this paper we break a knapsack based two-lock cryptosystem proposed at ICICS’03 [7]. The two-lock cryptosystem is a commutative encryption algorithm that is very useful for the construction of the general t-out-of-n oblivious transfers and millionaire protocol. However, our analysis shows that the proposed knapsack based two-lock cryptosystem is extremely insecure. The serious flaw is that t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید