The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an innovative technique for correcting transmission burst errors in data transmitted over amplitude modulated channels suffering from strong electromagnetic interference, such as encountered in military situations. Efficiency is achieved by separating the error detection from the correction process and using different codes for each case. The proposed technique is based on simple...
In this work, a method for backup and restoring data is proposed. The data is stored on different remote disks (storage nodes) and temporary or permanent loss of access to any q of them appears. The high efficiency of the proposed method is achieved by using a theoretically proved minimum number of backup storage nodes, which is equal to the number of the disks to which access has been lost. The theoretical...
This article proposes an approach that accelerates the realization of user identification schemes that follow the principle of zero knowledge. The proposed approach is based on using finite field arithmetic to replace the usual modular arithmetic approaches. The application of this efficient method that was developed using Galois Fields, renders feasible an exponential reduction of the computation...
An innovative method for formulating non-linear, oneway Boolean transformations is presented. These transformations are used at the core of an efficient implementation of the theoretically strict concept of zero knowledge identification of users. This implementation uses oneway non-linear Boolean transformations instead of operations on large numbers as a means of reducing the computational overheads...
An innovative approach to error detection and correction is presented that permits accelerated performance with reduced computational complexity as compared to Reed - Solomon codes, while using the same number of bits for error control. The approach is based on the mathematical operation of binary multiplication without carry. The mathematical background of the proposed approach is first presented...
Digital Ecosystems are largely driven by capabilities and infrastructures offered by cyber engineering, such as security, trust and risk containment. This paper seeks to promote trust in the reliability of cyber infrastructure systems by introducing an innovative technique for efficient correction of burst errors that have been caused by single or double interference incidents during data transmission...
User authentication procedures are a computer system's first line of defense against malicious attacks that could potentially jeopardize its availability and reliability. Computational complexity considerations may prevent system designers from implementing efficient authentication procedures. This paper presents a robust two level authentication procedure is presented that is highly efficient and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.