The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the paper are presented results, concerning the linear approximation of arbitrary function f with n binary inputs and m binary outputs. The based on the definition of linear approximation algorithm to compute a single value of the approximation table, is of exponential complexity O((n+m) · 2n).The presented in the paper fast algorithm computes the whole approximation table, in linear time O(n+m...
This paper discusses mixing of some non-linear chaotic maps, e.g. a logistic equation and a tent mapping, as simplified method for information encryption and decryption. A ciphertext is obtained by the iteration of defined mixing chaotic maps from an initial state. Because the secure control parameters of these chaotic mappings are modulated according to currently encrypted plaintext, the proposed...
The article discusses issues related to security policies which can emerge in the process of generating qualified certificates. There is presented a system enabling generation of qualified keys for asymmetric cryptographic system without the necessity of appearing in person of the person or body applying for the certificate at the seat of certification authority.
A method of logic synthesis for low-power design for two-patterns test sequence is presented in this paper. The idea of power consumption minimization by modifying the structure of LFSR (Linear Feedback Shift Register) have been proposed. In this paper some examples are included.
This paper is a continuation of the proposal of the linked authenticated dictionaries usage for certificate revocation. Usage of specific data structures allows preparing online certificate status verification protocol, in which status servers are unauthorized entities. Additionally this scheme provides possibility of generating certificate status requests dependent on time and achieving responses...
This paper presents an original concept of micropayment schemes which combine both the simplicity of an electronic pre-paid card without trusted third party and user's privacy. Two protocols are proposed - the first one is based on a secure one-way hash function, the second one is based on a cryptographically secure pseudorandom bit generator. The main advantage of the proposed schemes is the ability...
The paper presents the OF-APSAF integrated framework for authention protocol analysis. The framework is built on top of a well-established formal method CSP and its supporting tools: Casper and FDR. The integral part of OF-APSAF is the object-oriented semi-formal approach to modelling of cryptographic protocols, their application context and security requirements. The modelling is based on UML and...
In the paper the problem of information's security defined as fulfilment of confidentiality, authenticity and accessibility is presented. The accessibility, as the element of security is especially importand in realtime systems, in which the time of replying to received information is limited, while undelivering the messages right on time is unacceptable. The accessibility of information is fulfiled...
Access control in wide distributed networks has to be separated into domains in order to make it easily scalable and manageable. The management system also has to be automated to reduce complexity. Role based access control allows to achieve this goal, however adding public key infrastructure to RBAC approach would expand system capabilities in many ways. One of them is ability to specify certificate—based...
This paper introduces a new concept for memory testing based on transparent memory tests in terms of pattern sensitive faults detection with different address order generation technique. It is commonly known, that only march tests can be in use now to test modern memory chips. Every march test algorithm can be applied in different ways and still be effective to detect target faults. Using properties...
This paper focuses on software watermarking techniques and analysis of the executable code statistical characteristics as a mean of watermark embedding. As an application, several new approaches for executable code watermarking based on statistical characteristics variations have been proposed.
Survivability is the ability of system to continue operating in the presence of failures or malicious attacks [4]. We present an original method for performing probabilistic analysis of survivability of network systems. We can simulate failures and intrusion events in our method and then observe the effects of the injected events. Our model is based on Markov Decision Processes which are generalization...
This paper provides an analytical study of the closed type, multi-center networks with two different blocking strategies. The measures of effectiveness related to such models, and based on Quality of Service (QoS) requirement, are studied. In finite population (closed) multi-node models, where the number of tasks is equal to the population in the network, there are service centers and source centers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.