The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Encrypted data cannot ensure full immunity especially in anonymous applications, Even though it protect data by encryption methods. On the other side, we encounter with a set of huge processing units that can reveal data pattern through Internet frameworks. Although intruders are not able to break encrypted layers of data, still they can concentrate on the nature of the transmitted data. In the other...
We are living in the world in which most people and organizations communicate via digital devices so that a large quantity of information is electronically saved. In this condition, it's readily possible to access sensitive organizational and personal information. There is no doubt that of digital data, multimedia data carry heavy information load. This paper attempts to provide an efficient method...
Mobile phones are very popular due to small size, low weight, ease of use and increasing improvements in software and hardware. This popularity has caused a significant increase in the application of services via mobile phones since they are almost always available everywhere. One such service is mobile banking. When we talk about banking, financial issues and monetary transactions are discussed and...
In this paper, an efficient method for high speed hardware implementation of AES algorithm is presented. So far, many implementations of AES have been proposed, for various goals that effect the SubByte transformation in various ways. These methods of implementation are based on combinational logic and are done in polynomial bases. In the proposed architecture, it is done by using composite field...
In this paper, a novel algorithm for image encryption based on SHA-512 is proposed. The main idea of the algorithm is to use one half of image data for encryption of the other half of the image reciprocally. Distinct characteristics of the algorithm are high security, high sensitivity and high speed that can be applied for encryption of gray-level and color images. The algorithm consists of two main...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.