Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   9  
      EncryptionAlgorithmNetworkEncoding
    • by 
    •   17  
      CryptographyAlgorithmNonlinear filtersCryptanalysis
The IETF standard Mobile IP protocol is modified with IP security (IPSec) primitives, which control the packet flow from a mobile host through multiple security gateways. In addition, IPSec uses strong cryptographic authentication and... more
    • by 
    •   8  
      Computer ScienceNetwork SecurityMobile IPComputer Network
    • by  and +1
    •   77  
      MarketingPublic AdministrationPrivacyManufacturing
Usage Based Insurance (UBI) consists of schemes such as Pay As You Drive (PAYD) and Pay How You Drive (PHYD). In this paper, we detail the application of Blockchain in Usage Based Insurance schemes-PAYD and PHYD. Using Blockchain, we... more
    • by  and +2
    •   3  
      InsurancePrivate KeyBlockchain
In current scenario everything is being transferred on the web and other communication medium. So that we need to make our data secure from all other attacker and unauthorized person. So that we have to give lot of protection to the... more
    • by 
    •   6  
      MrRSAMagic RectanglePublic Key Cryptosystem
    • by 
    •   7  
      SteganographyHamming CodeData HidingPSNR
    • by 
    •   5  
      RcWepElectrical And Electronic EngineeringWIRED EQUIVALENT PRIVACY
In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA and NTRU system generally belongs... more
    • by 
    •   7  
      Computer ScienceEncryptionPerformance AnalysisDecryption
– Voting is usually recognized as one of the main characteristics of Democracy. Electronic election is a very recent idea regarding voting. Voter, once given his vote, has to rely upon the election system’s honesty and security. Free and... more
    • by 
    •   11  
      Electronic VotingDigital SignatureCryptographySecure Hash Algorithm
This paper concentrates on how the era of Crypto currency works and how it may have drastic effect on Indian economy. Crypto currency is not only gaining the pace but it has also entered into the small loops of Marketing, Social Media,... more
    • by 
    •   6  
      CryptographyChaotic cryptographyP2p networksCrypto Currency
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online... more
    • by 
    •   5  
      Digital Rights Management (DRM)CryptocurrencyPrivate KeyBlockchain
    • by 
    •   11  
      Communication systemsMarket ResearchQuantum CryptographyEncryption
    • by 
    •   11  
      Visual perceptionCircuits and SystemsCryptographyAlgorithm
In this paper we introduce an approach which is more secure than original RSA algorithm, which is used for digital signatures and encryption in public key cryptography. This approach eliminates the need to transfer n, the product of two... more
    • by 
    •   7  
      Digital SignatureCryptographyEncryptionPublic key cryptography
The proliferation of smartphones and use of reliable cloud technologies have given rise to various cloud-based applications. Remote disease prediction based on real-time medical data is one such application that has become very popular... more
    • by  and +1
    •   9  
      Computer SciencePrivacyCryptographyEncryption
Abstract: Cryptography is derived from a Greek word which means the art of protecting information by converting it into an unreadable format. In order to prevent some unwanted users or people to get access to the data cryptography is... more
    • by 
    •   6  
      CryptographyRSACryptosystemDiffie-Hellman-DSA
    • by 
    •   14  
      Social PsychologyOpen Source SoftwareConfidenceCryptography
    • by 
    •   6  
      CryptographyEncryptionSafetyCryptanalysis
    • by 
    •   10  
      Computer ScienceModelingComputer SecurityCryptography
    • by 
    •   12  
      Computer SecurityPure MathematicsCryptologyAES
Cloud computing environment provides on-demand access to shared resources that can be managed with minimal interaction of cloud service provider and validated service to the user. Cloud storage can be either public or private. Data in the... more
    • by 
    •   6  
      EncryptionCloud ComputingAESPrivate Key
    • by 
    •   9  
      Digital SignatureCryptographyQuantum ComputerHashing
    • by 
    •   32  
      Digital SignatureStatistical AnalysisComputer SecurityCryptography
This paper investigates interoperability problems arising from the use of dissimilar key recovery mechanisms in encrypted communications. The components that can cause interoperability problems are identified and a protocol is proposed... more
    • by 
    •   4  
      CryptographyInteroperabilityNegociationPrivate Key
    • by 
    •   31  
      Digital SignatureStatistical AnalysisComputer SecurityCryptography
In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA and NTRU system generally belongs... more
    • by 
    •   4  
      EncryptionDecryptionCipher textPrivate Key
    • by 
    •   19  
      CryptographyPure MathematicsSecurity RequirementsCryptology
The Mobile IP network environment for users is very vulnerable to malicious attacks, such as denial-of-service, man-in-the-middle, and other types of attacks. For protection, the IETF standard Mobile IP protocol is modified with IP... more
    • by 
    •   8  
      Network SecurityMobile IPWireless NetworkKey Management
ABSTRACT
    • by 
    •   9  
      Digital SignatureMobile ComputingMobile IPProtocols
An aggregate signature is a single short string that convinces any verifier that, for all 1 ≤ i ≤ n, signer S i signed message M i , where the n signers and n messages may all be distinct. The main motivation of aggregate signatures is... more
    • by 
    •   10  
      Digital SignatureModelingComputer SecurityOracle
In this paper, a method for digital image watermarking is described that is resistant to geometric transformations. A private key, which allows a very large number of watermarks, determines the watermark, which is embedded on a ring in... more
    • by 
    •   28  
      Cognitive ScienceImage ProcessingInformaticsWatermarking
    • by 
    •   8  
      CryptographyMobile DevicePublic key cryptographyPublic Key Encryption
    • by 
    •   18  
      Information SecurityPure MathematicsProvable SecuritySide-channel attack
ABSTRACT
    • by 
    •   9  
      Digital SignatureMobile ComputingMobile IPProtocols
Page 1. ◆ A Scheme for Authentication and Dynamic Key Exchange in Wireless Networks Uri Blumenthal, Milind M. Buddhikot, Juan A. Garay, Scott C. Miller, Sarvar Patel, Luca Salgarelli, and Dorothy Stanley Despite significant ...
    • by 
    •   13  
      EngineeringComputer ScienceCryptographyAuthentication
    • by 
    •   20  
      EngineeringComputer ScienceTechnologyImage Processing
    • by 
    •   15  
      Computer ScienceInformation SecurityPrivacyPain
    • by 
    •   12  
      Mobile Ad Hoc NetworksPrivacyAuthenticationSocial Networking Services
Abstract- With the globalization in the e-commerce, where everything is digital and is done online, may it be online shopping, money transfer, e-banking, e-voting, e- registration, sending email, security is the main priority. Reliance on... more
    • by 
    •   4  
      Digital SignaturePrivate KeyTrust ModelPublic Key
The Rivest Shamir Adleman (RSA) cryptosystem, named after its creators, is one of the most popular public key cryptosystems. It is most widely used for its strong security feature and easy implementation. The RSA cryptosystem has been... more
    • by 
    •   8  
      Digital SignatureAuthenticityConfidentialityPublic key cryptography
    • by 
    •   12  
      Computer ScienceDigital SignatureMobile ComputingMobile IP
The proliferation of smartphones and use of reliable cloud technologies have given rise to various cloud-based applications. Remote disease prediction based on real-time medical data is one such application that has become very popular... more
    • by 
    •   9  
      Computer SciencePrivacyCryptographyEncryption
    • by 
    •   4  
      CryptographyIntegrationPrivate KeyPublic Key
    • by 
    •   3  
      Information SystemsElectrical And Electronic EngineeringPrivate Key
    • by 
    •   8  
      Information SystemsDistributed ComputingDigital SignatureAuthentication
There are various remote sensor organization (WSN) applications being created day to day. These applications range from straightforward natural checking, for example, gathering temperatures in an agrarian ranch to complex applications,... more
    • by 
    •   5  
      Access ControlCloud ComputingWSN (Wireless sensor network)Framework
    • by 
    •   4  
      CryptographyIntegrationPrivate KeyPublic Key
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that cryptographic keys are kept absolutely se-cret. In general... more
    • by 
    •   7  
      Computer ScienceMemory ManagementCryptographyHardware
    • by 
    •   22  
      Distributed ComputingCryptographyVulnerabilityPure Mathematics