نتایج جستجو برای: symmetric cryptography
تعداد نتایج: 116835 فیلتر نتایج به سال:
The development of military (state) control systems in modern conditions hybrid warfare requires the possibility rapid expansion both functionality and scaling physical logical basis management, increasing range digitization use civilian communication channels to manage troops weapons. Not only computing power enemy, means suppressing / or blocking system, but also quantum technologies that pla...
In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients’ privacy protection. The security of the whole application system is strengthened through la...
In this paper we consider a problem of generation by cellular automata of high quality pseudorandom sequences useful in cryptography. For this purpose one dimensional nonuniform cellular automata is used. The quality of pseudorandom sequences generated by cellular automata depends on collective behavior of rules assigned to the cellular automata cells. Genetic algorithm is used to find suitable...
Chaos theory is the study of dynamical systems that are highly sensitive to initial conditions and exhibit seemingly random behavior. From the perspective of cryptography and information security, randomness generated from entirely deterministic systems is a very appealing property. As such, the application of chaos in modern cryptography has been a topic of much research and debate for over a ...
Today, one of the biggest concerns about using the Internet for business-critical data is security. This paper will concentrate on the area of software security based on public key cryptographic technology. The Public Key systems make it possible for two parties to communicate securely without either having to know or trust the other party. This is possible because a third party, called the Cer...
Symmetric cipher cryptography is an efficient technique for encrypting bits and letters to maintain secure communication data confidentiality. Compared asymmetric cryptography, symmetric has the speed advantage required various real-time applications. Yet, with distribution of micro-devices wider utilization Internet Things (IoT) Wireless Sensor Network (WSN), lightweight algorithms are operate...
The strategy for the selection of an optimal time function for dynamic visual cryptography is presented in this paper. Evolutionary algorithms are used to obtain the symmetric piece-wise uniform density function. The fitness function of each chromosome is associated with the derivative of the standard of the time-averaged moiré image. The reconstructed near-optimal time function represents the ...
A Sensor Node in Wireless Sensor Network has very limited resources such as processing capability, memory capacity, battery power, and communication capability. When the communication between any two sensor nodes are required to be secured, the symmetric key cryptography technique is used for its advantage over public key cryptography in terms of requirement of less resources. Keys are predistr...
Any web security system should achieve three conceptual goals are; confidentiality, integrity and Non-repudiation, and authentication. Also any system of communication when it is designed with these security services are taken into account and these security services must be defined and can be shortened format as (CIA).In this paper, we are going to discuss the theoretical background on the obj...
The heterogeneity and relative limited resources of the nodes deployed in hierarchical wireless sensor network (WSN) impose a new strategy to guarantee security and confidentiality. A deployment strategy is proposed and focuses on two different levels: complexity of the scheme and security requirement for the application. Three different cryptography mechanisms may be concurrently used in the s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید