نتایج جستجو برای: symmetric cryptography
تعداد نتایج: 116835 فیلتر نتایج به سال:
The main issue for the security of wireless sensor networks (WSNs) is how to allow nodes (SNs) establish and share cryptographic keys in an energy-efficient, storage-efficient, authentic manner their secure data transmission. Furthermost recent studies carried out this direction concerned with homogeneous which all has identical characteristics fundamental administration mechanisms. However, Cl...
This paper introduces a special type of symmetric cryptosystem called multi-encryption scheme. It allows users to encrypt multiple plaintexts into a single ciphertext. Each plaintext is protected with its own secret key, meaning that they can be decrypted individually by applying the decryption function with the corresponding key to the ciphertext. Compared to encrypting the ciphertexts one-by-...
Finally, I want to express my deepest gratitude to my wife Chikako, my daughter Tsugumi, and my son Tenga for their support and encouragemet. Abstract The subjects of this thesis are secure key management and secure location management for mobile nodes on wireless mobile networks. Recently, mobile networks become increasingly popular with the widespread availability of cellular phones and noteb...
In this paper, we present CCProc, a flexible cryptography coprocessor for symmetric-key algorithms. Based on an extensive analysis of many symmetric-key ciphers, including the five AES finalists, we designed an Instruction Set Architecture tailored to symmetric-key ciphers and built a hardware processor prototype by using the VHDL language. The design was mapped on FPGAs and ASIC. Results show ...
Time-sensitive mobile commerce is vulnerable to message authentication delays. Significant power consumption incurred by cryptography is another limiting factor of most mobile devices. In this paper, we present a scalable mobile cryptosystem, which installs a group key and an elliptic curve private/public key pair in each device to enable both symmetric key and public key cryptography. We propo...
This review is aimed to evaluate the importance of Symmetric Key Cryptography for Security in Distributed Systems. Businesses around the world as well as research and other such areas rely heavily on distributed systems these days. Hence, security is also a major concern due to the openness of the system. Out of the various available security measures, we, in this paper, concentrate in general ...
Exercising a collection of similar numerous easy to get sources and resources over the internet is termed as Cloud Computing A storage system basically large scale that consist many independent servers. During recent years huge changes adoption seen in cloud computing so security has become one major concerns it. As works on third party concern there not only for customers but also service prov...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید